General

  • Target

    875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba

  • Size

    1.7MB

  • Sample

    240424-wx7d7aeg86

  • MD5

    05d1c90ec78b45292ea6cbc0e0d2a5ec

  • SHA1

    e5ad67b0a0265b6f02b3869131f6bc2ef17eb279

  • SHA256

    875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba

  • SHA512

    d0a3f7d6d69e12f43d2adf0244750e728f20d546ecff92fc674b5f6ddc468f4353e2b77c91459b739556a034e0cfaa3d7c4024170d0c3108076a88d2c377038f

  • SSDEEP

    24576:VZyU70mm2QoyUaQQwi2Apubm/fEAD08cYcFpz7gT/To83oGuUNZ1JzSAmFOGYXF:OQ0LQqwxbo8CcYcFpUTb3oGuaJzRPGY

Malware Config

Targets

    • Target

      875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba

    • Size

      1.7MB

    • MD5

      05d1c90ec78b45292ea6cbc0e0d2a5ec

    • SHA1

      e5ad67b0a0265b6f02b3869131f6bc2ef17eb279

    • SHA256

      875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba

    • SHA512

      d0a3f7d6d69e12f43d2adf0244750e728f20d546ecff92fc674b5f6ddc468f4353e2b77c91459b739556a034e0cfaa3d7c4024170d0c3108076a88d2c377038f

    • SSDEEP

      24576:VZyU70mm2QoyUaQQwi2Apubm/fEAD08cYcFpz7gT/To83oGuUNZ1JzSAmFOGYXF:OQ0LQqwxbo8CcYcFpUTb3oGuaJzRPGY

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks