General

  • Target

    df7c28d10a10ef9a4eab08beb3b1d4028015d608fb1eeecc2f9a395b845a625f

  • Size

    869KB

  • Sample

    240423-feecpadc3y

  • MD5

    0b4f798bb48613ba29403988d1c61a34

  • SHA1

    4aebd421560f5527ac9969bfb059a7d990ad92b5

  • SHA256

    df7c28d10a10ef9a4eab08beb3b1d4028015d608fb1eeecc2f9a395b845a625f

  • SHA512

    3303e80aa3fea4676f750a9437da693e6392e1864df25a993aa698aaef6ba13cb3201b4e51b480413b31f4643a0b5571a7266bb0c4ba1d2900033be1b18f4c4e

  • SSDEEP

    24576:A8xlGOpFq/en6olo/r9Mr2ct3/Lir2iMMibs:AalGB98P1/LiiiMlbs

Malware Config

Targets

    • Target

      df7c28d10a10ef9a4eab08beb3b1d4028015d608fb1eeecc2f9a395b845a625f

    • Size

      869KB

    • MD5

      0b4f798bb48613ba29403988d1c61a34

    • SHA1

      4aebd421560f5527ac9969bfb059a7d990ad92b5

    • SHA256

      df7c28d10a10ef9a4eab08beb3b1d4028015d608fb1eeecc2f9a395b845a625f

    • SHA512

      3303e80aa3fea4676f750a9437da693e6392e1864df25a993aa698aaef6ba13cb3201b4e51b480413b31f4643a0b5571a7266bb0c4ba1d2900033be1b18f4c4e

    • SSDEEP

      24576:A8xlGOpFq/en6olo/r9Mr2ct3/Lir2iMMibs:AalGB98P1/LiiiMlbs

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks