General

  • Target

    5e68b3f72aa6f9728558db5025100adcfa614221600f7f1e6ae2eead0524323e

  • Size

    622KB

  • Sample

    240405-1wsxmaed66

  • MD5

    2b9dba94f2659fdeeaeb4d4872816caa

  • SHA1

    e608fabfbd255ab9b3701125d75ba24c502a0923

  • SHA256

    5e68b3f72aa6f9728558db5025100adcfa614221600f7f1e6ae2eead0524323e

  • SHA512

    98a3b7c9cc86ab89e77f062ea065b6b0e79237e804102ee98b5d7855b94a1550fd558e463c5db2c2bcd63696f573762d687922bb56f162f244a825d15c2d0081

  • SSDEEP

    12288:bPKL8qMLPW5ihBMw23O3Bc5Auo/my0bFFNTtx33po/sH0Hx3ffpI37:bSLOPSiDjZ3Bc5amy0pFfBjHe3fhIr

Malware Config

Targets

    • Target

      5e68b3f72aa6f9728558db5025100adcfa614221600f7f1e6ae2eead0524323e

    • Size

      622KB

    • MD5

      2b9dba94f2659fdeeaeb4d4872816caa

    • SHA1

      e608fabfbd255ab9b3701125d75ba24c502a0923

    • SHA256

      5e68b3f72aa6f9728558db5025100adcfa614221600f7f1e6ae2eead0524323e

    • SHA512

      98a3b7c9cc86ab89e77f062ea065b6b0e79237e804102ee98b5d7855b94a1550fd558e463c5db2c2bcd63696f573762d687922bb56f162f244a825d15c2d0081

    • SSDEEP

      12288:bPKL8qMLPW5ihBMw23O3Bc5Auo/my0bFFNTtx33po/sH0Hx3ffpI37:bSLOPSiDjZ3Bc5amy0pFfBjHe3fhIr

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks