General

  • Target

    85a781e8e173d52df4504b21a0f8a9f212f1ec3249406e5826e92ad8ca322536

  • Size

    1.6MB

  • Sample

    240419-3qpzwsbd9s

  • MD5

    bd94b44ec063dd0b2b0ba3f7585cc921

  • SHA1

    843b7c5934b370c631639396ab0b44597720bc09

  • SHA256

    85a781e8e173d52df4504b21a0f8a9f212f1ec3249406e5826e92ad8ca322536

  • SHA512

    dccb722faf235fb654aaf591bc2b84bd1dfafd2bda6c83a7a01e01d485a9707aeb30ad239e6ed3a3124a8a864f460c9c93271f1d28804b8714d7a63a1159b400

  • SSDEEP

    49152:5qIii1BPgWrCQzJXVeibrOSUd9S8c4LIlGi83K:001BPgWrCErUd64ZY

Malware Config

Targets

    • Target

      85a781e8e173d52df4504b21a0f8a9f212f1ec3249406e5826e92ad8ca322536

    • Size

      1.6MB

    • MD5

      bd94b44ec063dd0b2b0ba3f7585cc921

    • SHA1

      843b7c5934b370c631639396ab0b44597720bc09

    • SHA256

      85a781e8e173d52df4504b21a0f8a9f212f1ec3249406e5826e92ad8ca322536

    • SHA512

      dccb722faf235fb654aaf591bc2b84bd1dfafd2bda6c83a7a01e01d485a9707aeb30ad239e6ed3a3124a8a864f460c9c93271f1d28804b8714d7a63a1159b400

    • SSDEEP

      49152:5qIii1BPgWrCQzJXVeibrOSUd9S8c4LIlGi83K:001BPgWrCErUd64ZY

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks