General

  • Target

    7bcb3961d89acb66ba6d87a8c67b952773c435f414ce870b608986893c1be7b6

  • Size

    1.1MB

  • Sample

    240408-2seq9she5x

  • MD5

    0f156e93f667dbcc3116c0b29a4352b5

  • SHA1

    754f10c9730afc06f76f194dbb00e57d24fa6253

  • SHA256

    7bcb3961d89acb66ba6d87a8c67b952773c435f414ce870b608986893c1be7b6

  • SHA512

    7c2c70324b28803784b4b6d1b254e4829a931dc0a9e135ed0790d6ac1186dbda84cc9a03c7b38c8c8b7d6483116776d119b6215985f8790596326c1bfe00d3c6

  • SSDEEP

    24576:lUCMnLg6usY24H69mI6T429j8/OJcDkxPGBHYjfu7cfHJnq:+CKCPH684CAswkxPxjfuMJnq

Malware Config

Targets

    • Target

      7bcb3961d89acb66ba6d87a8c67b952773c435f414ce870b608986893c1be7b6

    • Size

      1.1MB

    • MD5

      0f156e93f667dbcc3116c0b29a4352b5

    • SHA1

      754f10c9730afc06f76f194dbb00e57d24fa6253

    • SHA256

      7bcb3961d89acb66ba6d87a8c67b952773c435f414ce870b608986893c1be7b6

    • SHA512

      7c2c70324b28803784b4b6d1b254e4829a931dc0a9e135ed0790d6ac1186dbda84cc9a03c7b38c8c8b7d6483116776d119b6215985f8790596326c1bfe00d3c6

    • SSDEEP

      24576:lUCMnLg6usY24H69mI6T429j8/OJcDkxPGBHYjfu7cfHJnq:+CKCPH684CAswkxPxjfuMJnq

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks