General

  • Target

    f5c363c3d9e05931626c1dbb10a4c3426d01a143585a56d07a80a92b9aaf5e40

  • Size

    529KB

  • Sample

    240421-fcr6rsbe78

  • MD5

    a98d87347d8c48874f6008228436be81

  • SHA1

    721e8c75eda191d60d081d8c30ee9c9a8b944c1f

  • SHA256

    f5c363c3d9e05931626c1dbb10a4c3426d01a143585a56d07a80a92b9aaf5e40

  • SHA512

    528887e3337ecbfedeaebcf7818a9b859b193f74cc03b1f9a43ff4d72037680c13d335557569be8cb5db88a3f14f76f29137ae0e6987879f18cc624f0d0523d9

  • SSDEEP

    12288:0EQoSLPVYr9t/ArVTXres3y6kkErWowMKa2Yz6EsNY77ls1n31:0wX/ArVT53y9kyCg2m6EpVs1l

Malware Config

Targets

    • Target

      f5c363c3d9e05931626c1dbb10a4c3426d01a143585a56d07a80a92b9aaf5e40

    • Size

      529KB

    • MD5

      a98d87347d8c48874f6008228436be81

    • SHA1

      721e8c75eda191d60d081d8c30ee9c9a8b944c1f

    • SHA256

      f5c363c3d9e05931626c1dbb10a4c3426d01a143585a56d07a80a92b9aaf5e40

    • SHA512

      528887e3337ecbfedeaebcf7818a9b859b193f74cc03b1f9a43ff4d72037680c13d335557569be8cb5db88a3f14f76f29137ae0e6987879f18cc624f0d0523d9

    • SSDEEP

      12288:0EQoSLPVYr9t/ArVTXres3y6kkErWowMKa2Yz6EsNY77ls1n31:0wX/ArVT53y9kyCg2m6EpVs1l

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks