General

  • Target

    8e66b0aca3997230fda2a8b3ae4916a071a87d8b0b4d6b51de00d12797f22e7e

  • Size

    732KB

  • Sample

    240504-appnhsha2t

  • MD5

    396cb490486ce4fdfb499f72d1161eee

  • SHA1

    170298bb3dd25b8bf03f2bfa88652aaf0ba1944b

  • SHA256

    8e66b0aca3997230fda2a8b3ae4916a071a87d8b0b4d6b51de00d12797f22e7e

  • SHA512

    7138a6722fa490bed6c780e27d4805eb5558b95ba892c58803a0bc82fe6c1c2ecedb440ad5dfcc937654d00269c31a028e3759ff965ed7f1d20cc9f41f15a2c2

  • SSDEEP

    12288:CEQoSswU1tIfB31rlyIIoD7NF49msFQnjFoxqcmJpidesFhY6V8sijhCsBVCm6D:CHvfB3Zzh704cSoxqcmJM5DV8BdC4VCp

Malware Config

Targets

    • Target

      8e66b0aca3997230fda2a8b3ae4916a071a87d8b0b4d6b51de00d12797f22e7e

    • Size

      732KB

    • MD5

      396cb490486ce4fdfb499f72d1161eee

    • SHA1

      170298bb3dd25b8bf03f2bfa88652aaf0ba1944b

    • SHA256

      8e66b0aca3997230fda2a8b3ae4916a071a87d8b0b4d6b51de00d12797f22e7e

    • SHA512

      7138a6722fa490bed6c780e27d4805eb5558b95ba892c58803a0bc82fe6c1c2ecedb440ad5dfcc937654d00269c31a028e3759ff965ed7f1d20cc9f41f15a2c2

    • SSDEEP

      12288:CEQoSswU1tIfB31rlyIIoD7NF49msFQnjFoxqcmJpidesFhY6V8sijhCsBVCm6D:CHvfB3Zzh704cSoxqcmJM5DV8BdC4VCp

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks