General

  • Target

    8a0b233457d15f119bf29929b11234becb3d58bdfe7ae7ae5d36227a3b3f227a

  • Size

    648KB

  • Sample

    240328-21qthabg66

  • MD5

    27b5e378fee94b63cac972238b6fd8ea

  • SHA1

    d977df7d46fe2bef480a32b0d3f7e7efe64e1dce

  • SHA256

    8a0b233457d15f119bf29929b11234becb3d58bdfe7ae7ae5d36227a3b3f227a

  • SHA512

    f80fd7be1f23583c19ec098d831799e72b4726b0f9ef4bbeb13851cbf753eee34b3ba731070965139a26d909813dc09677df293f43e44a5e4850d6f251bb4711

  • SSDEEP

    12288:0EQoSCQLbmVOZ6MvZ9Q4cK+hVBTD/7Tynuc3+0RQ2LK5KkFm+ZF:0nSVOZ6oZVc/nDku6RQFzl

Malware Config

Targets

    • Target

      8a0b233457d15f119bf29929b11234becb3d58bdfe7ae7ae5d36227a3b3f227a

    • Size

      648KB

    • MD5

      27b5e378fee94b63cac972238b6fd8ea

    • SHA1

      d977df7d46fe2bef480a32b0d3f7e7efe64e1dce

    • SHA256

      8a0b233457d15f119bf29929b11234becb3d58bdfe7ae7ae5d36227a3b3f227a

    • SHA512

      f80fd7be1f23583c19ec098d831799e72b4726b0f9ef4bbeb13851cbf753eee34b3ba731070965139a26d909813dc09677df293f43e44a5e4850d6f251bb4711

    • SSDEEP

      12288:0EQoSCQLbmVOZ6MvZ9Q4cK+hVBTD/7Tynuc3+0RQ2LK5KkFm+ZF:0nSVOZ6oZVc/nDku6RQFzl

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks