General

  • Target

    20becae7e56f7ff390ef06a07762528dd0251c98fb9f368e4aef42228079894b

  • Size

    416KB

  • Sample

    240403-x1zzysaf33

  • MD5

    04db70fb6f07eb144fa200f40af44916

  • SHA1

    a955aec031ebcd6726cb36d90468aceff943d700

  • SHA256

    20becae7e56f7ff390ef06a07762528dd0251c98fb9f368e4aef42228079894b

  • SHA512

    e77f4624a03e4d6aa85c96bd0666aeb074eaf2fd6cb15d6ceb583e66741423ba033616688d30130aa25a7fd5e582c49e66482734c13665da1222133216560429

  • SSDEEP

    6144:aDOxZXrSHXUTsGVJ3feZzXuhTgP8ccGnw6t/RjXCgCUhoilu8WvJEC3YT7L7YIuS:lXa8sGVjBg1wcy1CShw3YIuVRPLq

Malware Config

Targets

    • Target

      20becae7e56f7ff390ef06a07762528dd0251c98fb9f368e4aef42228079894b

    • Size

      416KB

    • MD5

      04db70fb6f07eb144fa200f40af44916

    • SHA1

      a955aec031ebcd6726cb36d90468aceff943d700

    • SHA256

      20becae7e56f7ff390ef06a07762528dd0251c98fb9f368e4aef42228079894b

    • SHA512

      e77f4624a03e4d6aa85c96bd0666aeb074eaf2fd6cb15d6ceb583e66741423ba033616688d30130aa25a7fd5e582c49e66482734c13665da1222133216560429

    • SSDEEP

      6144:aDOxZXrSHXUTsGVJ3feZzXuhTgP8ccGnw6t/RjXCgCUhoilu8WvJEC3YT7L7YIuS:lXa8sGVjBg1wcy1CShw3YIuVRPLq

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks