General

  • Target

    8f40bf3d4f2c3fa77c8a47a04b3f66491253a3b5d0c1afd5517f264e781254f0

  • Size

    434KB

  • Sample

    240408-3w411afe97

  • MD5

    639ace77eb0856c9196fe0015d6722a0

  • SHA1

    da9a22aabaefd88e618a20f74dfee65a391134a7

  • SHA256

    8f40bf3d4f2c3fa77c8a47a04b3f66491253a3b5d0c1afd5517f264e781254f0

  • SHA512

    6b0bd036e3aad790d4e4a8fb7fffdc792cb810d6d23189acfac5fcbfd871ef591293a1bc3a261466f20184fbd80f22dc7e9fd894e53ce881b975c2808148cfa1

  • SSDEEP

    12288:lXa8sfij6ge+et5BYRrX3A9kHsEXL7SxuHV0:lq8cY6t+eUns8s2L7SX

Malware Config

Targets

    • Target

      8f40bf3d4f2c3fa77c8a47a04b3f66491253a3b5d0c1afd5517f264e781254f0

    • Size

      434KB

    • MD5

      639ace77eb0856c9196fe0015d6722a0

    • SHA1

      da9a22aabaefd88e618a20f74dfee65a391134a7

    • SHA256

      8f40bf3d4f2c3fa77c8a47a04b3f66491253a3b5d0c1afd5517f264e781254f0

    • SHA512

      6b0bd036e3aad790d4e4a8fb7fffdc792cb810d6d23189acfac5fcbfd871ef591293a1bc3a261466f20184fbd80f22dc7e9fd894e53ce881b975c2808148cfa1

    • SSDEEP

      12288:lXa8sfij6ge+et5BYRrX3A9kHsEXL7SxuHV0:lq8cY6t+eUns8s2L7SX

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks