General

  • Target

    d0b145a240bff3f99040c827ed9f7bcda1404640fab0c2ef0f7832ec2caf80e4

  • Size

    88KB

  • Sample

    240406-dmlqmaac65

  • MD5

    554b1ed81252b8843be836fb89a1d481

  • SHA1

    3d0098aa5eb9b9597b7bb3741042a8841ca7b011

  • SHA256

    d0b145a240bff3f99040c827ed9f7bcda1404640fab0c2ef0f7832ec2caf80e4

  • SHA512

    62f7fcc34b41458d91e1af45ade241d90e9241580c07037fe32f7200fa3a359283c6d5725592d44e75ed6dbc8cbd3fdb10099205d4231e47ae6ae5d8ba28ec9a

  • SSDEEP

    1536:6RVCaKgzbLc54hukfgvYnouy8JV1Ayj4m/QWR/Rlq88vlnRqPR/1aViDRknJM2St:6jbLl/gvQoutX1Tj4mYWR/R4nkPR/1aC

Malware Config

Targets

    • Target

      d0b145a240bff3f99040c827ed9f7bcda1404640fab0c2ef0f7832ec2caf80e4

    • Size

      88KB

    • MD5

      554b1ed81252b8843be836fb89a1d481

    • SHA1

      3d0098aa5eb9b9597b7bb3741042a8841ca7b011

    • SHA256

      d0b145a240bff3f99040c827ed9f7bcda1404640fab0c2ef0f7832ec2caf80e4

    • SHA512

      62f7fcc34b41458d91e1af45ade241d90e9241580c07037fe32f7200fa3a359283c6d5725592d44e75ed6dbc8cbd3fdb10099205d4231e47ae6ae5d8ba28ec9a

    • SSDEEP

      1536:6RVCaKgzbLc54hukfgvYnouy8JV1Ayj4m/QWR/Rlq88vlnRqPR/1aViDRknJM2St:6jbLl/gvQoutX1Tj4mYWR/R4nkPR/1aC

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks