General

  • Target

    8c7b132fa9cebf919fead9d5fcc492797e641954e07dfe5c029fb1c3dc2ceedc

  • Size

    951KB

  • Sample

    240406-abt13sfb9w

  • MD5

    5791a98f5f78cfd19c18264f4ee67984

  • SHA1

    4f7467b461a283570a84eaedd751a1c4c163dba4

  • SHA256

    8c7b132fa9cebf919fead9d5fcc492797e641954e07dfe5c029fb1c3dc2ceedc

  • SHA512

    b31d9dcd31ef2047bd3235f43460439bf75f4f2187ddab08114a9c80a62e69897ed39c77fa0f206b5263044b0610baaa9289a6f51ae03d4392c9dec86eedcc24

  • SSDEEP

    24576:xn3TnVKGMPgH6q0vKG6tqYuYHJonPZBq4oDmHJdA:F3jgdPgH6qmKG6tqAeBqJDmzA

Malware Config

Targets

    • Target

      8c7b132fa9cebf919fead9d5fcc492797e641954e07dfe5c029fb1c3dc2ceedc

    • Size

      951KB

    • MD5

      5791a98f5f78cfd19c18264f4ee67984

    • SHA1

      4f7467b461a283570a84eaedd751a1c4c163dba4

    • SHA256

      8c7b132fa9cebf919fead9d5fcc492797e641954e07dfe5c029fb1c3dc2ceedc

    • SHA512

      b31d9dcd31ef2047bd3235f43460439bf75f4f2187ddab08114a9c80a62e69897ed39c77fa0f206b5263044b0610baaa9289a6f51ae03d4392c9dec86eedcc24

    • SSDEEP

      24576:xn3TnVKGMPgH6q0vKG6tqYuYHJonPZBq4oDmHJdA:F3jgdPgH6qmKG6tqAeBqJDmzA

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks