General

  • Target

    1698edfff2b5634f20a319afcca32175358b4586e8e467432fb4563d72d27a2a

  • Size

    906KB

  • Sample

    240429-xmlkeaad9w

  • MD5

    aede66136a60b72fc8be04d8acec265c

  • SHA1

    fac6e186825ffa215d1603245abfe8c791c9344b

  • SHA256

    1698edfff2b5634f20a319afcca32175358b4586e8e467432fb4563d72d27a2a

  • SHA512

    e76fd99dae922f1f5c67d09c8cc8764df192955e50d86a2cedcc71de94bf7b38218840091ea92a2894dc9b1b474fcff9126d3966a5df9d289b929aca605e1464

  • SSDEEP

    12288:oGHasii9Bw7CBBDu3EL5KM6VRfJFqQHFogv6paoYEg9CQBRtgb00dfLW0SKP//DF:86RZuKozVRf+Q9BCCRSZBC0SKr+rWOaL

Malware Config

Targets

    • Target

      1698edfff2b5634f20a319afcca32175358b4586e8e467432fb4563d72d27a2a

    • Size

      906KB

    • MD5

      aede66136a60b72fc8be04d8acec265c

    • SHA1

      fac6e186825ffa215d1603245abfe8c791c9344b

    • SHA256

      1698edfff2b5634f20a319afcca32175358b4586e8e467432fb4563d72d27a2a

    • SHA512

      e76fd99dae922f1f5c67d09c8cc8764df192955e50d86a2cedcc71de94bf7b38218840091ea92a2894dc9b1b474fcff9126d3966a5df9d289b929aca605e1464

    • SSDEEP

      12288:oGHasii9Bw7CBBDu3EL5KM6VRfJFqQHFogv6paoYEg9CQBRtgb00dfLW0SKP//DF:86RZuKozVRf+Q9BCCRSZBC0SKr+rWOaL

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks