General

  • Target

    1314259fe21d8ee8102c8ed70c9b2e90113c085daa1d5842af6ccd53778560cd

  • Size

    115KB

  • Sample

    240403-xhsg6ahe5t

  • MD5

    23e7d82f0e65b94fda4e31f169190a9d

  • SHA1

    c661d9da4cce77132d1ca80b9ac0396360f46fe6

  • SHA256

    1314259fe21d8ee8102c8ed70c9b2e90113c085daa1d5842af6ccd53778560cd

  • SHA512

    ba6147ed465d44e8ccccd898a98593c39ce771740e72da625f0f42a7ee13d846ff34545e0efbe309fc22f0fef132226926cb3a7c9322ece9c2f869ac86ab1a0a

  • SSDEEP

    3072:t/jbLl/gvQoutA1Tj4mYWR/R02XDU3nzMVUxi1D:VjluQoSiIo5R0Wo3nzh41D

Malware Config

Targets

    • Target

      1314259fe21d8ee8102c8ed70c9b2e90113c085daa1d5842af6ccd53778560cd

    • Size

      115KB

    • MD5

      23e7d82f0e65b94fda4e31f169190a9d

    • SHA1

      c661d9da4cce77132d1ca80b9ac0396360f46fe6

    • SHA256

      1314259fe21d8ee8102c8ed70c9b2e90113c085daa1d5842af6ccd53778560cd

    • SHA512

      ba6147ed465d44e8ccccd898a98593c39ce771740e72da625f0f42a7ee13d846ff34545e0efbe309fc22f0fef132226926cb3a7c9322ece9c2f869ac86ab1a0a

    • SSDEEP

      3072:t/jbLl/gvQoutA1Tj4mYWR/R02XDU3nzMVUxi1D:VjluQoSiIo5R0Wo3nzh41D

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks