General

  • Target

    470cab08c02d6eb5cea56f31c5f0e1c12cc4ad8a607abe16431bbbbebc67da41

  • Size

    1.4MB

  • Sample

    240420-1jfrjaag23

  • MD5

    c77f6eb8013267b6f532a2763a1be23d

  • SHA1

    f68201ff6b157d57dc0c9295b3185c18478f0ea5

  • SHA256

    470cab08c02d6eb5cea56f31c5f0e1c12cc4ad8a607abe16431bbbbebc67da41

  • SHA512

    c840d594e730ff12ab6def56bd43d4627248d877b3405fadc37a1a376af976789a9da0aae33ad1ef75c54022ef0f8ed6977a44576712ba40a838fe0b18c209ad

  • SSDEEP

    24576:YiiJzjtQYCusD6rAHC1Mhf1cCC+GZJ5zuU5qSKcPbsu9jVT9rvGO3:xiJzjtQYC1eMC1IGJZ/yUUSKw7Trp

Malware Config

Targets

    • Target

      470cab08c02d6eb5cea56f31c5f0e1c12cc4ad8a607abe16431bbbbebc67da41

    • Size

      1.4MB

    • MD5

      c77f6eb8013267b6f532a2763a1be23d

    • SHA1

      f68201ff6b157d57dc0c9295b3185c18478f0ea5

    • SHA256

      470cab08c02d6eb5cea56f31c5f0e1c12cc4ad8a607abe16431bbbbebc67da41

    • SHA512

      c840d594e730ff12ab6def56bd43d4627248d877b3405fadc37a1a376af976789a9da0aae33ad1ef75c54022ef0f8ed6977a44576712ba40a838fe0b18c209ad

    • SSDEEP

      24576:YiiJzjtQYCusD6rAHC1Mhf1cCC+GZJ5zuU5qSKcPbsu9jVT9rvGO3:xiJzjtQYC1eMC1IGJZ/yUUSKw7Trp

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks