General

  • Target

    cfe67dc0f112ee08ac13cca056e45258105014f10eb5cc7f432ac571b166a899

  • Size

    1.3MB

  • Sample

    240319-lsrg3agf83

  • MD5

    58e761d55078c9f8cf14d0d7f14c1856

  • SHA1

    3000cbd9a83825e24f66d1da6dd6cc0d53b487cc

  • SHA256

    cfe67dc0f112ee08ac13cca056e45258105014f10eb5cc7f432ac571b166a899

  • SHA512

    576ea33a7b21506a6e5ab95391a6478805d1df6cfbe594187b834984a377bbcd5e46d979c63249674ac2cf897ed23a2d72be64214d6a5c7eee4bebf03820519a

  • SSDEEP

    24576:l+aekL6WKjEik+9+5Ybdafw8Q/V/Xddm+fC7xoG:iWKjE605YbdPXNHmT1

Malware Config

Targets

    • Target

      cfe67dc0f112ee08ac13cca056e45258105014f10eb5cc7f432ac571b166a899

    • Size

      1.3MB

    • MD5

      58e761d55078c9f8cf14d0d7f14c1856

    • SHA1

      3000cbd9a83825e24f66d1da6dd6cc0d53b487cc

    • SHA256

      cfe67dc0f112ee08ac13cca056e45258105014f10eb5cc7f432ac571b166a899

    • SHA512

      576ea33a7b21506a6e5ab95391a6478805d1df6cfbe594187b834984a377bbcd5e46d979c63249674ac2cf897ed23a2d72be64214d6a5c7eee4bebf03820519a

    • SSDEEP

      24576:l+aekL6WKjEik+9+5Ybdafw8Q/V/Xddm+fC7xoG:iWKjE605YbdPXNHmT1

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks