General

  • Target

    cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af

  • Size

    286KB

  • Sample

    240417-e3hjksfc3x

  • MD5

    8344c17140c7b0d718722cfd1b44bd4d

  • SHA1

    eb82e0164844d06899eafc0fb6c49b5c8aa5958a

  • SHA256

    cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af

  • SHA512

    99559f19368b75abe677941fbd2112642521cbeea90358566768598789c371a30937a309134fa030afd8ef888ffeef9b4718c2d3115b64fa4004db4e23f64972

  • SSDEEP

    6144:CjluQoSIIo5RaqrF3h0PNrpil0hh0m+Aa9MmgNZR2T3miV:CEQoSs7SPNNI0hKmq9MmgfRPiV

Malware Config

Targets

    • Target

      cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af

    • Size

      286KB

    • MD5

      8344c17140c7b0d718722cfd1b44bd4d

    • SHA1

      eb82e0164844d06899eafc0fb6c49b5c8aa5958a

    • SHA256

      cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af

    • SHA512

      99559f19368b75abe677941fbd2112642521cbeea90358566768598789c371a30937a309134fa030afd8ef888ffeef9b4718c2d3115b64fa4004db4e23f64972

    • SSDEEP

      6144:CjluQoSIIo5RaqrF3h0PNrpil0hh0m+Aa9MmgNZR2T3miV:CEQoSs7SPNNI0hKmq9MmgfRPiV

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks