General

  • Target

    897a442c8f4fdb105d84c788bb9bbafc39f24bf989908fb26d2d419805247a69

  • Size

    7.5MB

  • Sample

    240325-sjp17sbd73

  • MD5

    6f3c2a513277f24304f015b43e6740cc

  • SHA1

    86c172214dd804e31dcdba263a9da7f50de8a435

  • SHA256

    897a442c8f4fdb105d84c788bb9bbafc39f24bf989908fb26d2d419805247a69

  • SHA512

    4eea59c3932d2cce313c420156e82864a91c57f45e0eda0e0eac698dd08b87d292b0b3089e0ff0b5664f273017cb32dc94115521332e051bb083b24f12156e41

  • SSDEEP

    196608:91OiwhG/NCCij57913DGSNHqhKmVMvJ3zPA9d9MV0zgsgd:3Opciv13DDqhK2MGj+V0zgX

Malware Config

Targets

    • Target

      897a442c8f4fdb105d84c788bb9bbafc39f24bf989908fb26d2d419805247a69

    • Size

      7.5MB

    • MD5

      6f3c2a513277f24304f015b43e6740cc

    • SHA1

      86c172214dd804e31dcdba263a9da7f50de8a435

    • SHA256

      897a442c8f4fdb105d84c788bb9bbafc39f24bf989908fb26d2d419805247a69

    • SHA512

      4eea59c3932d2cce313c420156e82864a91c57f45e0eda0e0eac698dd08b87d292b0b3089e0ff0b5664f273017cb32dc94115521332e051bb083b24f12156e41

    • SSDEEP

      196608:91OiwhG/NCCij57913DGSNHqhKmVMvJ3zPA9d9MV0zgsgd:3Opciv13DDqhK2MGj+V0zgX

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks