General

  • Target

    6c6954a315036c806669a9370b9468352cfe1ea763bfec27a9070467ab520143

  • Size

    654KB

  • Sample

    240430-27n89aab4t

  • MD5

    25efbc17a60e994c395985f89e4f41ff

  • SHA1

    49578abd7cbf3f462f8a91969dc25e6c6a87a91d

  • SHA256

    6c6954a315036c806669a9370b9468352cfe1ea763bfec27a9070467ab520143

  • SHA512

    d0a8b93313ac8fe2d66219359323c802043a78caefba89fb25c1449ed5b1d460591ba010951944bb936a82b74047418b07ca400b93346297e0f5d930de7a2902

  • SSDEEP

    12288:lXa8slsIM3JhoITKyYBS3zTlTk7GoiQ7ONRhO57oTtCUD5NinT08pI6qEyov:lq8K4JQy++Nk73ZORhs7oTtCUGnT021l

Malware Config

Targets

    • Target

      6c6954a315036c806669a9370b9468352cfe1ea763bfec27a9070467ab520143

    • Size

      654KB

    • MD5

      25efbc17a60e994c395985f89e4f41ff

    • SHA1

      49578abd7cbf3f462f8a91969dc25e6c6a87a91d

    • SHA256

      6c6954a315036c806669a9370b9468352cfe1ea763bfec27a9070467ab520143

    • SHA512

      d0a8b93313ac8fe2d66219359323c802043a78caefba89fb25c1449ed5b1d460591ba010951944bb936a82b74047418b07ca400b93346297e0f5d930de7a2902

    • SSDEEP

      12288:lXa8slsIM3JhoITKyYBS3zTlTk7GoiQ7ONRhO57oTtCUD5NinT08pI6qEyov:lq8K4JQy++Nk73ZORhs7oTtCUGnT021l

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks