General

  • Target

    e59bcd52634caa49cc4b14a5ca919f0cdfe0db336249b1f7d988e63743169135

  • Size

    238KB

  • Sample

    240405-cegahahh86

  • MD5

    2f7170aa8a615f8257a5593a14d40a3a

  • SHA1

    781ed84b3010b02cbaec57988b0d02daffcf3e97

  • SHA256

    e59bcd52634caa49cc4b14a5ca919f0cdfe0db336249b1f7d988e63743169135

  • SHA512

    e752392a70a71705baa50dcc4202bcef69be7695be05af8a6986493f1804a6cc1c71ddd9aed43de2adfa9560d0563c7b3958e7f557b80634452d8ad13614dffc

  • SSDEEP

    6144:SjluQoSKIo5R2gVEu9PmEUmUZMsPNLXNjKTlU03iGMX:SEQoSeSgOu9zU2sPNLXKU03ifX

Malware Config

Targets

    • Target

      e59bcd52634caa49cc4b14a5ca919f0cdfe0db336249b1f7d988e63743169135

    • Size

      238KB

    • MD5

      2f7170aa8a615f8257a5593a14d40a3a

    • SHA1

      781ed84b3010b02cbaec57988b0d02daffcf3e97

    • SHA256

      e59bcd52634caa49cc4b14a5ca919f0cdfe0db336249b1f7d988e63743169135

    • SHA512

      e752392a70a71705baa50dcc4202bcef69be7695be05af8a6986493f1804a6cc1c71ddd9aed43de2adfa9560d0563c7b3958e7f557b80634452d8ad13614dffc

    • SSDEEP

      6144:SjluQoSKIo5R2gVEu9PmEUmUZMsPNLXNjKTlU03iGMX:SEQoSeSgOu9zU2sPNLXKU03ifX

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks