General

  • Target

    0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c

  • Size

    1.8MB

  • Sample

    240408-wwb7naba6y

  • MD5

    c6179e99bad990a7635804bdea29785c

  • SHA1

    b9ace4df614fe203c1f3096875cbf40c652508d6

  • SHA256

    0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c

  • SHA512

    33d2ea47f49b3b42e540fad0728b6bf3fc11b6182b9e935c6f7b14bb5be662cdeef834304086dc059f266ea9b39a648de7271aaebd948ca392c99e5c2ca11f59

  • SSDEEP

    49152:0hWkgKKcqohBZltJkecvnkiLEY+Z3OxxqJmxH7Sa7rqTm:0YXKRFltJk9vki9+MTqJm7qS

Malware Config

Targets

    • Target

      0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c

    • Size

      1.8MB

    • MD5

      c6179e99bad990a7635804bdea29785c

    • SHA1

      b9ace4df614fe203c1f3096875cbf40c652508d6

    • SHA256

      0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c

    • SHA512

      33d2ea47f49b3b42e540fad0728b6bf3fc11b6182b9e935c6f7b14bb5be662cdeef834304086dc059f266ea9b39a648de7271aaebd948ca392c99e5c2ca11f59

    • SSDEEP

      49152:0hWkgKKcqohBZltJkecvnkiLEY+Z3OxxqJmxH7Sa7rqTm:0YXKRFltJk9vki9+MTqJm7qS

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks