General

  • Target

    f264b5f97e918889a82f82602983e42a595913c6aafb36889ad04aa6ed1a854d

  • Size

    2.0MB

  • Sample

    240425-fr3aaafh44

  • MD5

    3219238bf3f59436c81028d7a201ccd1

  • SHA1

    645f1e9d9c196ec5d42a04414a1d01ee57802360

  • SHA256

    f264b5f97e918889a82f82602983e42a595913c6aafb36889ad04aa6ed1a854d

  • SHA512

    82bf78b1ec51935b367a46862d6db2accbc33324c2b4cfd8a947a7d35e80a4c742426ed4fddcfed526351f4bc4eec6cac5d8fe8fdc9eecba15130def7117346e

  • SSDEEP

    49152:xvSxuGsnYtVLogDJjgHSZIxcH9K4km78Url408:xyuGsnYtVL3DJqhxk1k24v

Malware Config

Targets

    • Target

      f264b5f97e918889a82f82602983e42a595913c6aafb36889ad04aa6ed1a854d

    • Size

      2.0MB

    • MD5

      3219238bf3f59436c81028d7a201ccd1

    • SHA1

      645f1e9d9c196ec5d42a04414a1d01ee57802360

    • SHA256

      f264b5f97e918889a82f82602983e42a595913c6aafb36889ad04aa6ed1a854d

    • SHA512

      82bf78b1ec51935b367a46862d6db2accbc33324c2b4cfd8a947a7d35e80a4c742426ed4fddcfed526351f4bc4eec6cac5d8fe8fdc9eecba15130def7117346e

    • SSDEEP

      49152:xvSxuGsnYtVLogDJjgHSZIxcH9K4km78Url408:xyuGsnYtVL3DJqhxk1k24v

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks