General

  • Target

    b68d4cbe6ebf793e1555aa24eb8632e66270e07eb673ae781225d840d5772ac9

  • Size

    1.8MB

  • Sample

    240409-bxph6adf91

  • MD5

    85bf54e82d31e2ada9035b2d3e29538b

  • SHA1

    e169b794370d67210601a92f764961d910adb6ef

  • SHA256

    b68d4cbe6ebf793e1555aa24eb8632e66270e07eb673ae781225d840d5772ac9

  • SHA512

    785dd63781a569b8ada9d2d6f0f7fac29507da459be83f9e4e606b92e08ec8ae9963f451dfce49d0c75bb704cec989d806cf5c56da751ac493800d6b665600e2

  • SSDEEP

    49152:A1IN42+Trwdeyb56uZQaB60KOV+ydoiEW83JotpYWU5UdiES1:e+qMdbCO6fs+NWhIGiB

Malware Config

Targets

    • Target

      b68d4cbe6ebf793e1555aa24eb8632e66270e07eb673ae781225d840d5772ac9

    • Size

      1.8MB

    • MD5

      85bf54e82d31e2ada9035b2d3e29538b

    • SHA1

      e169b794370d67210601a92f764961d910adb6ef

    • SHA256

      b68d4cbe6ebf793e1555aa24eb8632e66270e07eb673ae781225d840d5772ac9

    • SHA512

      785dd63781a569b8ada9d2d6f0f7fac29507da459be83f9e4e606b92e08ec8ae9963f451dfce49d0c75bb704cec989d806cf5c56da751ac493800d6b665600e2

    • SSDEEP

      49152:A1IN42+Trwdeyb56uZQaB60KOV+ydoiEW83JotpYWU5UdiES1:e+qMdbCO6fs+NWhIGiB

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks