General

  • Target

    acaeb20af6267e33b2020bb361b757586866fc0099fe1be322b0595d8e970caa

  • Size

    1.4MB

  • Sample

    240411-b2rjbagh33

  • MD5

    ea6b88459f8d805004eb6d544319839d

  • SHA1

    1f2869561e033ede0464f1f9834da61174b0feab

  • SHA256

    acaeb20af6267e33b2020bb361b757586866fc0099fe1be322b0595d8e970caa

  • SHA512

    b35cf9518da6eb1863cc364a2435ab31c820cc9014901016f0ba134f37155a34f38342c1e285339783bfe0e261205ef89a15c3e67c10de62e5f18a9998ffaad3

  • SSDEEP

    24576:VTu9ZLGlAwYUFAWDeDJ4ltpHMIIpR+qyrXgabVNOSeG29csG6mnC7O:gMFzlDeDJ4lPMIIpR+qyrPBNOrG2ynCC

Malware Config

Targets

    • Target

      acaeb20af6267e33b2020bb361b757586866fc0099fe1be322b0595d8e970caa

    • Size

      1.4MB

    • MD5

      ea6b88459f8d805004eb6d544319839d

    • SHA1

      1f2869561e033ede0464f1f9834da61174b0feab

    • SHA256

      acaeb20af6267e33b2020bb361b757586866fc0099fe1be322b0595d8e970caa

    • SHA512

      b35cf9518da6eb1863cc364a2435ab31c820cc9014901016f0ba134f37155a34f38342c1e285339783bfe0e261205ef89a15c3e67c10de62e5f18a9998ffaad3

    • SSDEEP

      24576:VTu9ZLGlAwYUFAWDeDJ4ltpHMIIpR+qyrXgabVNOSeG29csG6mnC7O:gMFzlDeDJ4lPMIIpR+qyrPBNOrG2ynCC

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks