General

  • Target

    adca3b6966c084b29935835fea52659ae38025219b79a18ec69e9c66fedbdd5a

  • Size

    775KB

  • Sample

    240503-cn8fcaef74

  • MD5

    563e3d7c7016b5e53da3ddabe0353c58

  • SHA1

    bd2d5c742050d1c23a3558c758d8872f1de33297

  • SHA256

    adca3b6966c084b29935835fea52659ae38025219b79a18ec69e9c66fedbdd5a

  • SHA512

    0b3a6df7b632bc5f0ae2bbdea5443e812f15539f84ae676323a279717bf48f554be70b34dc1b0a425c33609150e35b9f864b5ed094f0822a62088baf93418ede

  • SSDEEP

    24576:t2cuVktIFpuCXum6JlaI7kdcn9OjY7d8Knc:QcuVkS3+m6eIIind5Bc

Malware Config

Targets

    • Target

      adca3b6966c084b29935835fea52659ae38025219b79a18ec69e9c66fedbdd5a

    • Size

      775KB

    • MD5

      563e3d7c7016b5e53da3ddabe0353c58

    • SHA1

      bd2d5c742050d1c23a3558c758d8872f1de33297

    • SHA256

      adca3b6966c084b29935835fea52659ae38025219b79a18ec69e9c66fedbdd5a

    • SHA512

      0b3a6df7b632bc5f0ae2bbdea5443e812f15539f84ae676323a279717bf48f554be70b34dc1b0a425c33609150e35b9f864b5ed094f0822a62088baf93418ede

    • SSDEEP

      24576:t2cuVktIFpuCXum6JlaI7kdcn9OjY7d8Knc:QcuVkS3+m6eIIind5Bc

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks