General

  • Target

    dfcf9e4b6411b4beacf338fcd81617f745e4bfe61b2aa2cf76ee300ce75b849d

  • Size

    383KB

  • Sample

    240421-eds9saac67

  • MD5

    9aa44e4256e2346eeafea91e8677d715

  • SHA1

    066d210939354d3cce8abaedaabfd33509054a7d

  • SHA256

    dfcf9e4b6411b4beacf338fcd81617f745e4bfe61b2aa2cf76ee300ce75b849d

  • SHA512

    0f7e7642a8f55dcce38b84bc5165b496ae418775d172714119ffc752609f5e89ab9ccb360bf5300308dee40b689bac8c6f9443936dd5c36121c89c2f1fdde559

  • SSDEEP

    6144:9rTfUHeeSKOS9ccFKk3Y9t9Yivv8H4DqrOejMUH+13:9n8yN0Mr81Z5Q3

Malware Config

Targets

    • Target

      dfcf9e4b6411b4beacf338fcd81617f745e4bfe61b2aa2cf76ee300ce75b849d

    • Size

      383KB

    • MD5

      9aa44e4256e2346eeafea91e8677d715

    • SHA1

      066d210939354d3cce8abaedaabfd33509054a7d

    • SHA256

      dfcf9e4b6411b4beacf338fcd81617f745e4bfe61b2aa2cf76ee300ce75b849d

    • SHA512

      0f7e7642a8f55dcce38b84bc5165b496ae418775d172714119ffc752609f5e89ab9ccb360bf5300308dee40b689bac8c6f9443936dd5c36121c89c2f1fdde559

    • SSDEEP

      6144:9rTfUHeeSKOS9ccFKk3Y9t9Yivv8H4DqrOejMUH+13:9n8yN0Mr81Z5Q3

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks