General

  • Target

    3e0d33efe3c6c4255c2a831a2aad7e98

  • Size

    2.0MB

  • Sample

    240409-1675ashf4s

  • MD5

    3e0d33efe3c6c4255c2a831a2aad7e98

  • SHA1

    c0d51e74652b7d3e0057217febb144366118e304

  • SHA256

    2cf6491aaca2e48a5e726da399c47e4fc45f2a30418909ceed9737cc159f89e5

  • SHA512

    d39a0f98c032888ed0dcf36c3d3e7ba6a72b9a14d81c2cb658c7a23c613019d11e694a52e603a7c2791d10d7190b720153a872db5c3f6b484465ca0167020ff8

  • SSDEEP

    49152:C2R5N3N9qdhCvIAzj1wLcQiHWciKvfK7k5WMOwwg:C2R7NYMqcQqJl67fZg

Malware Config

Targets

    • Target

      3e0d33efe3c6c4255c2a831a2aad7e98

    • Size

      2.0MB

    • MD5

      3e0d33efe3c6c4255c2a831a2aad7e98

    • SHA1

      c0d51e74652b7d3e0057217febb144366118e304

    • SHA256

      2cf6491aaca2e48a5e726da399c47e4fc45f2a30418909ceed9737cc159f89e5

    • SHA512

      d39a0f98c032888ed0dcf36c3d3e7ba6a72b9a14d81c2cb658c7a23c613019d11e694a52e603a7c2791d10d7190b720153a872db5c3f6b484465ca0167020ff8

    • SSDEEP

      49152:C2R5N3N9qdhCvIAzj1wLcQiHWciKvfK7k5WMOwwg:C2R7NYMqcQqJl67fZg

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks