General

  • Target

    60dcb840ee4962101a12799a945ac01cccad6fd18905cf7f7334d329c3b557b8

  • Size

    950KB

  • Sample

    240421-1814rscb52

  • MD5

    1830b3f5f10b2d5b29f2f00b3e203849

  • SHA1

    c7fbb0c1951385d285ed36921d3ed3915cf21c13

  • SHA256

    60dcb840ee4962101a12799a945ac01cccad6fd18905cf7f7334d329c3b557b8

  • SHA512

    a49e6493e8762d0524e783a92282a8ea36c37dff5bb1150e03a02f300ee2805e235a03cf5adc482e8b49c66b16df63da9db36e16a9ef85fc5468ec2485af2684

  • SSDEEP

    24576:xnBHFqohoB0Az5zZKKDKq5NzMKimpTVVB/VPhg:FjutNlKmZz3h/VPS

Malware Config

Targets

    • Target

      60dcb840ee4962101a12799a945ac01cccad6fd18905cf7f7334d329c3b557b8

    • Size

      950KB

    • MD5

      1830b3f5f10b2d5b29f2f00b3e203849

    • SHA1

      c7fbb0c1951385d285ed36921d3ed3915cf21c13

    • SHA256

      60dcb840ee4962101a12799a945ac01cccad6fd18905cf7f7334d329c3b557b8

    • SHA512

      a49e6493e8762d0524e783a92282a8ea36c37dff5bb1150e03a02f300ee2805e235a03cf5adc482e8b49c66b16df63da9db36e16a9ef85fc5468ec2485af2684

    • SSDEEP

      24576:xnBHFqohoB0Az5zZKKDKq5NzMKimpTVVB/VPhg:FjutNlKmZz3h/VPS

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks