General

  • Target

    d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62

  • Size

    365KB

  • Sample

    240411-dmrlwaaf97

  • MD5

    f562386d1f4e671ce46e91bc4dc14f5f

  • SHA1

    124aca41c4f964ae7d238f9acd43bbe77d6b23a4

  • SHA256

    d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62

  • SHA512

    cec50876d60ae29de348f5a674c124dee8b34cdd36a794a89b5cc8ec26d32a5fc41fad91aa8da82f9ac1a6c2695a4a5fdf4223e2d069135460fbd5e5c04ad6ef

  • SSDEEP

    6144:9rTfUHeeSKOS9ccFKk3Y9t9YmlTVQ8zTz9zzLzzfA5WHTIMIKA:9n8yN0Mr8m9VQ8zTz9zzLzzomA

Malware Config

Targets

    • Target

      d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62

    • Size

      365KB

    • MD5

      f562386d1f4e671ce46e91bc4dc14f5f

    • SHA1

      124aca41c4f964ae7d238f9acd43bbe77d6b23a4

    • SHA256

      d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62

    • SHA512

      cec50876d60ae29de348f5a674c124dee8b34cdd36a794a89b5cc8ec26d32a5fc41fad91aa8da82f9ac1a6c2695a4a5fdf4223e2d069135460fbd5e5c04ad6ef

    • SSDEEP

      6144:9rTfUHeeSKOS9ccFKk3Y9t9YmlTVQ8zTz9zzLzzfA5WHTIMIKA:9n8yN0Mr8m9VQ8zTz9zzLzzomA

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks