General

  • Target

    67c4ba482bc978c2a7f7fd4febde24749ab9961004ebebb8f2f798c1783af284

  • Size

    1.7MB

  • Sample

    240422-2zqr4she4v

  • MD5

    4b0d67c0e794f4e29f7e54e8778ad963

  • SHA1

    943c6f06939e46a8377785405f2035d47437a260

  • SHA256

    67c4ba482bc978c2a7f7fd4febde24749ab9961004ebebb8f2f798c1783af284

  • SHA512

    b481c108f218020c5df44b0f9d6dc195b5a87517d2c6cb73ff6941ac701c4adc8b2c6355722f522c0c6f70dcd157e72bcd190ee174182194b425f443bc583f2d

  • SSDEEP

    49152:RXNTawxaOITMIHj/wiKRKR4NM3UgoAebS:RXNaMIHs9RKR4K3UieW

Malware Config

Targets

    • Target

      67c4ba482bc978c2a7f7fd4febde24749ab9961004ebebb8f2f798c1783af284

    • Size

      1.7MB

    • MD5

      4b0d67c0e794f4e29f7e54e8778ad963

    • SHA1

      943c6f06939e46a8377785405f2035d47437a260

    • SHA256

      67c4ba482bc978c2a7f7fd4febde24749ab9961004ebebb8f2f798c1783af284

    • SHA512

      b481c108f218020c5df44b0f9d6dc195b5a87517d2c6cb73ff6941ac701c4adc8b2c6355722f522c0c6f70dcd157e72bcd190ee174182194b425f443bc583f2d

    • SSDEEP

      49152:RXNTawxaOITMIHj/wiKRKR4NM3UgoAebS:RXNaMIHs9RKR4K3UieW

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks