General

  • Target

    67f9eb9182108379df31bed3e9853026f6fc10174aa2ad3d05933c196a86b4b5

  • Size

    761KB

  • Sample

    240415-15bppsbg5s

  • MD5

    7465a360aa14ecdc15873b64ed747105

  • SHA1

    f8eb751ab5485d615d4f7ab4afe0caa960969189

  • SHA256

    67f9eb9182108379df31bed3e9853026f6fc10174aa2ad3d05933c196a86b4b5

  • SHA512

    e05f8ff155408c982373c1abbc5d275ca18275d116c1430cab3fb75e18cf58a178fa728fc8cef5d6f4ec53f8bba1799849e03f2572a25a43f51edca6a21ed373

  • SSDEEP

    12288:VEQoSfqu0+p7vCUiPyzsGHFvqzp9xwbNZCa5MwCIsd5rb9XQ3SGmver2pUAQdyQ6:Vs+p7vCU0yIGlizp9xwxZC+VSnFXQCb1

Malware Config

Targets

    • Target

      67f9eb9182108379df31bed3e9853026f6fc10174aa2ad3d05933c196a86b4b5

    • Size

      761KB

    • MD5

      7465a360aa14ecdc15873b64ed747105

    • SHA1

      f8eb751ab5485d615d4f7ab4afe0caa960969189

    • SHA256

      67f9eb9182108379df31bed3e9853026f6fc10174aa2ad3d05933c196a86b4b5

    • SHA512

      e05f8ff155408c982373c1abbc5d275ca18275d116c1430cab3fb75e18cf58a178fa728fc8cef5d6f4ec53f8bba1799849e03f2572a25a43f51edca6a21ed373

    • SSDEEP

      12288:VEQoSfqu0+p7vCUiPyzsGHFvqzp9xwbNZCa5MwCIsd5rb9XQ3SGmver2pUAQdyQ6:Vs+p7vCU0yIGlizp9xwxZC+VSnFXQCb1

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks