General

  • Target

    ca48206ebed7977de57922f459edf66bad0601ef9f3095ef6fd70cb6ba9dc397

  • Size

    6.6MB

  • Sample

    240405-p9asesdd36

  • MD5

    469b4c5b61f1b95b39735cc5d0ca312e

  • SHA1

    89017dd05d9a92019643e1e2edcad0c009e4f85f

  • SHA256

    ca48206ebed7977de57922f459edf66bad0601ef9f3095ef6fd70cb6ba9dc397

  • SHA512

    a7ed989857a8b711bfa8cad43c9b9f4e3975c075101c4bf9fa0fa7d59f5686b2e31ceaf528227a4450953e4854e07284c5e6dcd81c7e2390e73ff8c504e2b7db

  • SSDEEP

    98304:91Oo/smnlnfhRxDOZhqwcgmd8ucLH3x8j49801Bmpjk/HT22It4KIpe2EKtzfc:91OqBnl/xaYdfcLHhrmpjq2Rae2PA

Malware Config

Targets

    • Target

      ca48206ebed7977de57922f459edf66bad0601ef9f3095ef6fd70cb6ba9dc397

    • Size

      6.6MB

    • MD5

      469b4c5b61f1b95b39735cc5d0ca312e

    • SHA1

      89017dd05d9a92019643e1e2edcad0c009e4f85f

    • SHA256

      ca48206ebed7977de57922f459edf66bad0601ef9f3095ef6fd70cb6ba9dc397

    • SHA512

      a7ed989857a8b711bfa8cad43c9b9f4e3975c075101c4bf9fa0fa7d59f5686b2e31ceaf528227a4450953e4854e07284c5e6dcd81c7e2390e73ff8c504e2b7db

    • SSDEEP

      98304:91Oo/smnlnfhRxDOZhqwcgmd8ucLH3x8j49801Bmpjk/HT22It4KIpe2EKtzfc:91OqBnl/xaYdfcLHhrmpjq2Rae2PA

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks