General

  • Target

    f170c6c40109d8a8b5a8f9845b8334173d24a9809e5eeea6f30191673f5f37c3

  • Size

    1.4MB

  • Sample

    240411-eymmqscb44

  • MD5

    157224bba64fc0faf199ac971843ace8

  • SHA1

    6558e7ec7cb59d6758e5d3771f72a0d1fbf2be17

  • SHA256

    f170c6c40109d8a8b5a8f9845b8334173d24a9809e5eeea6f30191673f5f37c3

  • SHA512

    2ab19bb5fbb0fbc19221d0e3d9bc409965d1f202fdf58a0f4e272838995e4a5d3ee4090cf186d9ceedcfcd33e29abf80cead586b1f7fbb4b982c343f864aea58

  • SSDEEP

    24576:SRrCpNQD43+AUb9yHUm45aLQOpLLqQ+Sz9H3QSwL1XfmOFWtoXo8A+OlWZE16kf:9NQD4uP9y5yaLdf+IArXfmOouXo9f

Malware Config

Targets

    • Target

      f170c6c40109d8a8b5a8f9845b8334173d24a9809e5eeea6f30191673f5f37c3

    • Size

      1.4MB

    • MD5

      157224bba64fc0faf199ac971843ace8

    • SHA1

      6558e7ec7cb59d6758e5d3771f72a0d1fbf2be17

    • SHA256

      f170c6c40109d8a8b5a8f9845b8334173d24a9809e5eeea6f30191673f5f37c3

    • SHA512

      2ab19bb5fbb0fbc19221d0e3d9bc409965d1f202fdf58a0f4e272838995e4a5d3ee4090cf186d9ceedcfcd33e29abf80cead586b1f7fbb4b982c343f864aea58

    • SSDEEP

      24576:SRrCpNQD43+AUb9yHUm45aLQOpLLqQ+Sz9H3QSwL1XfmOFWtoXo8A+OlWZE16kf:9NQD4uP9y5yaLdf+IArXfmOouXo9f

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks