General

  • Target

    2024-04-30_a513b78dbeb8812f596aeb483ee18fff_mafia

  • Size

    8.3MB

  • Sample

    240430-nltpysbb7y

  • MD5

    a513b78dbeb8812f596aeb483ee18fff

  • SHA1

    a74578687884801fafdb8f0dc7357ac76e600cf9

  • SHA256

    ab189ea48bea31159a35dbc810496a47a3fca3368370a04922967a78bdea4510

  • SHA512

    b43cf01048d845bea8d58667df599685176f8255bed5f9a12ef8b2db658be506f54261e10ecc2a86468903b085cd010eafb2790ab3770681c50e939267427cb2

  • SSDEEP

    196608:K6eyyDdxk4pCHG9RNQJXz/lU9E+JGeo9T/4erWY+1WXB6:czY4pCHG9RNQbUO4o/lWYCW

Malware Config

Targets

    • Target

      2024-04-30_a513b78dbeb8812f596aeb483ee18fff_mafia

    • Size

      8.3MB

    • MD5

      a513b78dbeb8812f596aeb483ee18fff

    • SHA1

      a74578687884801fafdb8f0dc7357ac76e600cf9

    • SHA256

      ab189ea48bea31159a35dbc810496a47a3fca3368370a04922967a78bdea4510

    • SHA512

      b43cf01048d845bea8d58667df599685176f8255bed5f9a12ef8b2db658be506f54261e10ecc2a86468903b085cd010eafb2790ab3770681c50e939267427cb2

    • SSDEEP

      196608:K6eyyDdxk4pCHG9RNQJXz/lU9E+JGeo9T/4erWY+1WXB6:czY4pCHG9RNQbUO4o/lWYCW

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

MITRE ATT&CK Enterprise v15

Tasks