General

  • Target

    e5d98e899c3d47b25bf33f172ec2d290791b1dab8a349482beed393c22d970d6

  • Size

    6.7MB

  • Sample

    240406-rese4acf39

  • MD5

    8c0b6185b6283b9a04648bbc44b8c7f9

  • SHA1

    ffba6fff474fd3e58a2ed282b2c77738d245a42c

  • SHA256

    e5d98e899c3d47b25bf33f172ec2d290791b1dab8a349482beed393c22d970d6

  • SHA512

    0ec2132151f993066a28fcb95c958e1fe5255c78ee318e4d8cb413ef2e648d3b301d746cad5af82d72b5c70ebded8ad98fac9e46be2c681ba9534b712dca4a23

  • SSDEEP

    98304:91Od6S+s82WJ/pIY4+aJoHHFBozt4FnmRVQNWvV+AV6XUEtRZ0/kVQDVEKAB:91OsS+/2O/p4JoHlBoyF0Cg+AqDXZPCA

Malware Config

Targets

    • Target

      e5d98e899c3d47b25bf33f172ec2d290791b1dab8a349482beed393c22d970d6

    • Size

      6.7MB

    • MD5

      8c0b6185b6283b9a04648bbc44b8c7f9

    • SHA1

      ffba6fff474fd3e58a2ed282b2c77738d245a42c

    • SHA256

      e5d98e899c3d47b25bf33f172ec2d290791b1dab8a349482beed393c22d970d6

    • SHA512

      0ec2132151f993066a28fcb95c958e1fe5255c78ee318e4d8cb413ef2e648d3b301d746cad5af82d72b5c70ebded8ad98fac9e46be2c681ba9534b712dca4a23

    • SSDEEP

      98304:91Od6S+s82WJ/pIY4+aJoHHFBozt4FnmRVQNWvV+AV6XUEtRZ0/kVQDVEKAB:91OsS+/2O/p4JoHlBoyF0Cg+AqDXZPCA

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks