General

  • Target

    0b67372303543ffd6723d0137e591be9889da47dd3bedfbff96b88dcbe3a053c

  • Size

    7.5MB

  • Sample

    240328-21vsfsbb5w

  • MD5

    237f6419f85fe8e734acc1d55ad74ae3

  • SHA1

    449b288c56f080af5cdd15205d589d5f92af2e37

  • SHA256

    0b67372303543ffd6723d0137e591be9889da47dd3bedfbff96b88dcbe3a053c

  • SHA512

    4f6fb06476836838df0f8c06e7654dc3c6bf626ef05de46548bda3bfd7b9fcdf8e906b0a122ced51c4dddcf50fb5286db2b52c1dda681e0e15a3c8f0c2ca4420

  • SSDEEP

    196608:91OmFkc6AIzxoe9/9/gFj8VJzhBzU7deu/Vyo+TiNZykc7:3OAx6AIzSed9qj8VJdBU7d1yP

Malware Config

Targets

    • Target

      0b67372303543ffd6723d0137e591be9889da47dd3bedfbff96b88dcbe3a053c

    • Size

      7.5MB

    • MD5

      237f6419f85fe8e734acc1d55ad74ae3

    • SHA1

      449b288c56f080af5cdd15205d589d5f92af2e37

    • SHA256

      0b67372303543ffd6723d0137e591be9889da47dd3bedfbff96b88dcbe3a053c

    • SHA512

      4f6fb06476836838df0f8c06e7654dc3c6bf626ef05de46548bda3bfd7b9fcdf8e906b0a122ced51c4dddcf50fb5286db2b52c1dda681e0e15a3c8f0c2ca4420

    • SSDEEP

      196608:91OmFkc6AIzxoe9/9/gFj8VJzhBzU7deu/Vyo+TiNZykc7:3OAx6AIzSed9qj8VJdBU7d1yP

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks