General

  • Target

    1e5a88a3ad76fa4399f44f28d102acdd9d0609829e399ae3b479f3fc97b9d4da

  • Size

    713KB

  • Sample

    240418-x98cpach62

  • MD5

    87e75b7d999af99cd59104e83c7d9282

  • SHA1

    dcabbe523fe316bd109be3ff8302017d33bc7d00

  • SHA256

    1e5a88a3ad76fa4399f44f28d102acdd9d0609829e399ae3b479f3fc97b9d4da

  • SHA512

    6540587442e594db5b5f913c16e79a519d360bb0501bba50db28647affec1504784fb7793a3c93789e291a1dba2f1a1b3e487687ee1b0181a45e065223874b58

  • SSDEEP

    12288:CEQoSswP3w0Bmz9619qoy8EQXQXRKChoSC6w5jCb6xoMH7xpCrbIb7n3HE:CZP3w0qsxEQAXRKMoUw5jPx3pCXIP3k

Malware Config

Targets

    • Target

      1e5a88a3ad76fa4399f44f28d102acdd9d0609829e399ae3b479f3fc97b9d4da

    • Size

      713KB

    • MD5

      87e75b7d999af99cd59104e83c7d9282

    • SHA1

      dcabbe523fe316bd109be3ff8302017d33bc7d00

    • SHA256

      1e5a88a3ad76fa4399f44f28d102acdd9d0609829e399ae3b479f3fc97b9d4da

    • SHA512

      6540587442e594db5b5f913c16e79a519d360bb0501bba50db28647affec1504784fb7793a3c93789e291a1dba2f1a1b3e487687ee1b0181a45e065223874b58

    • SSDEEP

      12288:CEQoSswP3w0Bmz9619qoy8EQXQXRKChoSC6w5jCb6xoMH7xpCrbIb7n3HE:CZP3w0qsxEQAXRKMoUw5jPx3pCXIP3k

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks