General

  • Target

    f211e187bbb0f069c06523fe45ac5f82e4aeef4b5490896245ecffd35dd671ca

  • Size

    1.7MB

  • Sample

    240425-fretzsga4z

  • MD5

    8d3d360f0d8531ea00c87b5ac78b82b3

  • SHA1

    416e8bbb4af96e02c0fc0e5359bea4ca4e71015a

  • SHA256

    f211e187bbb0f069c06523fe45ac5f82e4aeef4b5490896245ecffd35dd671ca

  • SHA512

    fd4ea9b7c848dc0e2600ad7847e5fc7465aaa62a128a1980eddc0c6c6d6f1ff4b6d5cdec6a23de8c4509903d8993b8519746d2433ff584cdfd25afa4cd429541

  • SSDEEP

    49152:5jhAft2oFZFzV0/QY0AltozK0r0V2TWjRcL2B2jspY:thA1nH0/cAg5r9TWR5B2jR

Malware Config

Targets

    • Target

      f211e187bbb0f069c06523fe45ac5f82e4aeef4b5490896245ecffd35dd671ca

    • Size

      1.7MB

    • MD5

      8d3d360f0d8531ea00c87b5ac78b82b3

    • SHA1

      416e8bbb4af96e02c0fc0e5359bea4ca4e71015a

    • SHA256

      f211e187bbb0f069c06523fe45ac5f82e4aeef4b5490896245ecffd35dd671ca

    • SHA512

      fd4ea9b7c848dc0e2600ad7847e5fc7465aaa62a128a1980eddc0c6c6d6f1ff4b6d5cdec6a23de8c4509903d8993b8519746d2433ff584cdfd25afa4cd429541

    • SSDEEP

      49152:5jhAft2oFZFzV0/QY0AltozK0r0V2TWjRcL2B2jspY:thA1nH0/cAg5r9TWR5B2jR

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks