General

  • Target

    00e4f62cae091ad449b973667eb2737cf1413e5a7f53e0c6235a6cb992a1a664

  • Size

    2.0MB

  • Sample

    240408-wpjyxsag7t

  • MD5

    103b0495f882312ab2bd3445a66cff36

  • SHA1

    70554af578ca7777c23b23a8d985624af29a93b4

  • SHA256

    00e4f62cae091ad449b973667eb2737cf1413e5a7f53e0c6235a6cb992a1a664

  • SHA512

    9b2c8c76ed42894b96db5f4f66b501b837cbd01df726d33052402132e6c77e9ba25f4ddc2ede7ce12ef2b5721e273eca78a63b0183f8bb88abcd5b90bf2f8881

  • SSDEEP

    49152:VxJA4TRIrhlqwOPEKveu7Y7kJ+VtbKXFGJOC5xHdVn:HlTarfEPEKvV7Y7BVtb0o0YxHdVn

Malware Config

Targets

    • Target

      00e4f62cae091ad449b973667eb2737cf1413e5a7f53e0c6235a6cb992a1a664

    • Size

      2.0MB

    • MD5

      103b0495f882312ab2bd3445a66cff36

    • SHA1

      70554af578ca7777c23b23a8d985624af29a93b4

    • SHA256

      00e4f62cae091ad449b973667eb2737cf1413e5a7f53e0c6235a6cb992a1a664

    • SHA512

      9b2c8c76ed42894b96db5f4f66b501b837cbd01df726d33052402132e6c77e9ba25f4ddc2ede7ce12ef2b5721e273eca78a63b0183f8bb88abcd5b90bf2f8881

    • SSDEEP

      49152:VxJA4TRIrhlqwOPEKveu7Y7kJ+VtbKXFGJOC5xHdVn:HlTarfEPEKvV7Y7BVtb0o0YxHdVn

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks