General

  • Target

    24aac3594f7d73c0e854b80b14ff785c28aa6dfd50e0c0113e47f17c1dc82df2

  • Size

    6.4MB

  • Sample

    240409-fm8aqsag6z

  • MD5

    defd4f7b77fae9fed1fe7f1b6871e126

  • SHA1

    c118c185b6886063b258eb06abd6c342acab07a7

  • SHA256

    24aac3594f7d73c0e854b80b14ff785c28aa6dfd50e0c0113e47f17c1dc82df2

  • SHA512

    1e496d278e003c18aea9ce99b3f0383eb7835a59fc75bbeaf5a1a79074ab46e7e178f77a63b5937cfd04781bb82550671403f6749388a25ba64030a9a30930f2

  • SSDEEP

    196608:91OY/7zYrLNbdwsL6afXVVuJJREXmb/YRDuAD2hI:3OYTzkbdwByX61E64jShI

Malware Config

Targets

    • Target

      24aac3594f7d73c0e854b80b14ff785c28aa6dfd50e0c0113e47f17c1dc82df2

    • Size

      6.4MB

    • MD5

      defd4f7b77fae9fed1fe7f1b6871e126

    • SHA1

      c118c185b6886063b258eb06abd6c342acab07a7

    • SHA256

      24aac3594f7d73c0e854b80b14ff785c28aa6dfd50e0c0113e47f17c1dc82df2

    • SHA512

      1e496d278e003c18aea9ce99b3f0383eb7835a59fc75bbeaf5a1a79074ab46e7e178f77a63b5937cfd04781bb82550671403f6749388a25ba64030a9a30930f2

    • SSDEEP

      196608:91OY/7zYrLNbdwsL6afXVVuJJREXmb/YRDuAD2hI:3OYTzkbdwByX61E64jShI

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks