General

  • Target

    aab53b15c41daf89f4728bcf2e17a6cb988d20ca06733639c6cc98a7f1ecdd29

  • Size

    1.6MB

  • Sample

    240411-by5lrsgg46

  • MD5

    d8e96f46b4f280f00343c266cee210e6

  • SHA1

    15a78c846a70cd85cf353900933c3c24bb629dbd

  • SHA256

    aab53b15c41daf89f4728bcf2e17a6cb988d20ca06733639c6cc98a7f1ecdd29

  • SHA512

    1cb63994a8843c46f3a81f5b6c601c0370b2be4a0a81c0326cdc2f22b4da259231b5e7d92c18cf9e8d23ec2e4db091d18f33d7337c6b069930f692ad4ac3c6c4

  • SSDEEP

    24576:CIRV7utviSwHshP+bgXUNkfmQxUZcKt0uUIO57rZfuSi9kL37/fZkwUVC/1EdoZ5:1yRKGUNk+Qiu8UbrYSlL7hUc1KoeU

Malware Config

Targets

    • Target

      aab53b15c41daf89f4728bcf2e17a6cb988d20ca06733639c6cc98a7f1ecdd29

    • Size

      1.6MB

    • MD5

      d8e96f46b4f280f00343c266cee210e6

    • SHA1

      15a78c846a70cd85cf353900933c3c24bb629dbd

    • SHA256

      aab53b15c41daf89f4728bcf2e17a6cb988d20ca06733639c6cc98a7f1ecdd29

    • SHA512

      1cb63994a8843c46f3a81f5b6c601c0370b2be4a0a81c0326cdc2f22b4da259231b5e7d92c18cf9e8d23ec2e4db091d18f33d7337c6b069930f692ad4ac3c6c4

    • SSDEEP

      24576:CIRV7utviSwHshP+bgXUNkfmQxUZcKt0uUIO57rZfuSi9kL37/fZkwUVC/1EdoZ5:1yRKGUNk+Qiu8UbrYSlL7hUc1KoeU

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks