General

  • Target

    a6f79f827c241031e219573cdae006eddf352f7eb00528e6cb52a2bbae0a9af0

  • Size

    1.1MB

  • Sample

    240406-bkg9bagg47

  • MD5

    440a4e4c05b633ae2c2965c8f932858d

  • SHA1

    ae1d400a6bc52e9b0c37714be6e3ec6df9b636b4

  • SHA256

    a6f79f827c241031e219573cdae006eddf352f7eb00528e6cb52a2bbae0a9af0

  • SHA512

    606624586d2a2f2864e498359dccb772bd922a347e58d6f5427f085b39910d7eb89cb576ab3751d308561c8f4dc8f778d3f1e169dbdb5c24d60a4ca7112a1b0c

  • SSDEEP

    24576:pWA1S/AfoRURd9GLS7XbcUfTzLqv3aH8csYeVa0eJmPx5LcSm4TH3k:YA1S/AfTICXIWTqf+dsN3dZlcTWk

Malware Config

Targets

    • Target

      a6f79f827c241031e219573cdae006eddf352f7eb00528e6cb52a2bbae0a9af0

    • Size

      1.1MB

    • MD5

      440a4e4c05b633ae2c2965c8f932858d

    • SHA1

      ae1d400a6bc52e9b0c37714be6e3ec6df9b636b4

    • SHA256

      a6f79f827c241031e219573cdae006eddf352f7eb00528e6cb52a2bbae0a9af0

    • SHA512

      606624586d2a2f2864e498359dccb772bd922a347e58d6f5427f085b39910d7eb89cb576ab3751d308561c8f4dc8f778d3f1e169dbdb5c24d60a4ca7112a1b0c

    • SSDEEP

      24576:pWA1S/AfoRURd9GLS7XbcUfTzLqv3aH8csYeVa0eJmPx5LcSm4TH3k:YA1S/AfTICXIWTqf+dsN3dZlcTWk

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks