General

  • Target

    400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66

  • Size

    659KB

  • Sample

    240315-xza97sag78

  • MD5

    d910fd7e83c8dfdc55d8dc751a8083da

  • SHA1

    3756aff613cf1305a73744961b0844a8407476d6

  • SHA256

    400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66

  • SHA512

    149805cbe20da3af358caab02ad967c37ce97070fc04fba21f81591f5f0e7e2d93e961fe0c1a50d53f9c383ebba8fd4f000a293d747181104d58ab4757d0c043

  • SSDEEP

    12288:JEyDMhqhFp975vxxGB2iXNmyboACgb7l+av5JxUwr2tnHMQh9yjHDxB:JBLxRGdcjACgdzuTnVyDDxB

Malware Config

Targets

    • Target

      400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66

    • Size

      659KB

    • MD5

      d910fd7e83c8dfdc55d8dc751a8083da

    • SHA1

      3756aff613cf1305a73744961b0844a8407476d6

    • SHA256

      400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66

    • SHA512

      149805cbe20da3af358caab02ad967c37ce97070fc04fba21f81591f5f0e7e2d93e961fe0c1a50d53f9c383ebba8fd4f000a293d747181104d58ab4757d0c043

    • SSDEEP

      12288:JEyDMhqhFp975vxxGB2iXNmyboACgb7l+av5JxUwr2tnHMQh9yjHDxB:JBLxRGdcjACgdzuTnVyDDxB

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks