General

  • Target

    e6fe558f6c026493bff28c7451069715.exe

  • Size

    307KB

  • Sample

    240320-3ettpsfa21

  • MD5

    e6fe558f6c026493bff28c7451069715

  • SHA1

    edfa573934a1b0505727e0d4b1b0544f11523e7e

  • SHA256

    75e985ad843283de707a360843a5ac65e0800b8dde13004c9eec247bc4ee4437

  • SHA512

    ff896b158a5f9b81ef945667774e4d0ab48940ac5848a8c7fe8fd151773c3acb60d9673cd155317a90d3658ea5997158fd60b1b6dd3161927a3d3c86cfd61dbd

  • SSDEEP

    3072:RlJLNbCckq+PcKNEXZDr6EQb4rhLxZ60uDO/6sBh7aFTvCoVoJ7rMRk2JYn3:RsqXZq5b4rXZJu6/jn7aFTe7ARW

Malware Config

Targets

    • Target

      e6fe558f6c026493bff28c7451069715.exe

    • Size

      307KB

    • MD5

      e6fe558f6c026493bff28c7451069715

    • SHA1

      edfa573934a1b0505727e0d4b1b0544f11523e7e

    • SHA256

      75e985ad843283de707a360843a5ac65e0800b8dde13004c9eec247bc4ee4437

    • SHA512

      ff896b158a5f9b81ef945667774e4d0ab48940ac5848a8c7fe8fd151773c3acb60d9673cd155317a90d3658ea5997158fd60b1b6dd3161927a3d3c86cfd61dbd

    • SSDEEP

      3072:RlJLNbCckq+PcKNEXZDr6EQb4rhLxZ60uDO/6sBh7aFTvCoVoJ7rMRk2JYn3:RsqXZq5b4rXZJu6/jn7aFTe7ARW

    • Buer

      Buer is a new modular loader first seen in August 2019.

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks