General

  • Target

    be0aa600a26f04637c69303a42435267bb0c024d07b44602ec408df04330e3c1

  • Size

    300KB

  • Sample

    240430-ckb8qshd48

  • MD5

    48cdf6e647660c3c785b074a7621c80d

  • SHA1

    716900ef86d2c452894ce205701215c7ca8b1ad3

  • SHA256

    be0aa600a26f04637c69303a42435267bb0c024d07b44602ec408df04330e3c1

  • SHA512

    efd82ee2f103cff0d7b4bcc533d0fdbc04655fbf8d68c5e688c1b8fb5b0045c3494351654c7448d0cb30c5e67846059e6e759e9f23be27618e9d578c9b999e82

  • SSDEEP

    6144:YjluQoSPIo5R4nM/40yJNSKvw6rJk5jNoSiSJSYcu5tQ7abJOr5kpSHOLRCQ5:YEQoSpqhn4OujNoSrJqu5tQ7agr5kpLX

Malware Config

Targets

    • Target

      be0aa600a26f04637c69303a42435267bb0c024d07b44602ec408df04330e3c1

    • Size

      300KB

    • MD5

      48cdf6e647660c3c785b074a7621c80d

    • SHA1

      716900ef86d2c452894ce205701215c7ca8b1ad3

    • SHA256

      be0aa600a26f04637c69303a42435267bb0c024d07b44602ec408df04330e3c1

    • SHA512

      efd82ee2f103cff0d7b4bcc533d0fdbc04655fbf8d68c5e688c1b8fb5b0045c3494351654c7448d0cb30c5e67846059e6e759e9f23be27618e9d578c9b999e82

    • SSDEEP

      6144:YjluQoSPIo5R4nM/40yJNSKvw6rJk5jNoSiSJSYcu5tQ7abJOr5kpSHOLRCQ5:YEQoSpqhn4OujNoSrJqu5tQ7agr5kpLX

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks