General

  • Target

    systemutilities.msi

  • Size

    9.9MB

  • Sample

    240408-3enbxseh75

  • MD5

    41eda719c231e212e02b2683d36edfa4

  • SHA1

    7257a3350b7b856c16b146ff063f002b42903543

  • SHA256

    1c6191ddeb164efff30358f7de88022577b6bfe0dfbe0a29ab0f3a2b25637bd2

  • SHA512

    1d7382b75d1b12a690d2caeead05c74c3fe83f7888be1bee1bbcfec31d0675967473393b39af87d97ad10c91d2ad6420ad0be8ac58b45d88779ec8e9c4403e77

  • SSDEEP

    196608:mkBx8XfML5Nf7QJ91JUREHYtDBkXfML5D9qdSK:mw8XfMvy91JUgyDOXfM1I

Malware Config

Targets

    • Target

      systemutilities.msi

    • Size

      9.9MB

    • MD5

      41eda719c231e212e02b2683d36edfa4

    • SHA1

      7257a3350b7b856c16b146ff063f002b42903543

    • SHA256

      1c6191ddeb164efff30358f7de88022577b6bfe0dfbe0a29ab0f3a2b25637bd2

    • SHA512

      1d7382b75d1b12a690d2caeead05c74c3fe83f7888be1bee1bbcfec31d0675967473393b39af87d97ad10c91d2ad6420ad0be8ac58b45d88779ec8e9c4403e77

    • SSDEEP

      196608:mkBx8XfML5Nf7QJ91JUREHYtDBkXfML5D9qdSK:mw8XfMvy91JUgyDOXfM1I

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks