General

  • Target

    6e0414081ed0deb803fbf2c252ff45617280ba55f47c2ad8b49434bae24257ee

  • Size

    331KB

  • Sample

    240422-3a128ahe98

  • MD5

    066add8d8bc04048c478f0a7589fca1f

  • SHA1

    d1115c8107ff0a2806fcc23d535fe5b3613208c7

  • SHA256

    6e0414081ed0deb803fbf2c252ff45617280ba55f47c2ad8b49434bae24257ee

  • SHA512

    6037e8209dc26e0e8395ac77a18293c1756c41c247bcb34bf7d70e4146ae961e4368fe189679fc6cb842094bba05cca8061c7087e2cf79628defdad94143f950

  • SSDEEP

    6144:NPDLCLqIo5R4nM/4VLvvS7fmOvQVek9RqFY6M2YhDrfr4RnCVzXVH1s3Wo:NPKL+q9xSG9RqFAZD70RC6t

Malware Config

Targets

    • Target

      6e0414081ed0deb803fbf2c252ff45617280ba55f47c2ad8b49434bae24257ee

    • Size

      331KB

    • MD5

      066add8d8bc04048c478f0a7589fca1f

    • SHA1

      d1115c8107ff0a2806fcc23d535fe5b3613208c7

    • SHA256

      6e0414081ed0deb803fbf2c252ff45617280ba55f47c2ad8b49434bae24257ee

    • SHA512

      6037e8209dc26e0e8395ac77a18293c1756c41c247bcb34bf7d70e4146ae961e4368fe189679fc6cb842094bba05cca8061c7087e2cf79628defdad94143f950

    • SSDEEP

      6144:NPDLCLqIo5R4nM/4VLvvS7fmOvQVek9RqFY6M2YhDrfr4RnCVzXVH1s3Wo:NPKL+q9xSG9RqFAZD70RC6t

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks