General

  • Target

    82b553f00e9aed135a2e32b96cfb3f839d1a8e12ec4e0bffeeaff84a646c870a

  • Size

    1.9MB

  • Sample

    240510-3d3p8afg8v

  • MD5

    1efc90c842fd67734e301aebb2592b09

  • SHA1

    a5a581bc531665f783b7fb6defcce550c1f8de80

  • SHA256

    82b553f00e9aed135a2e32b96cfb3f839d1a8e12ec4e0bffeeaff84a646c870a

  • SHA512

    deda5716b6884ee3dfa0a478592fcc8e227cd1ad98fc4217b1eb9fbff464d968a7b28c69b4292982d1fcabfa25adc20d30aeb70fae048b11621aabc10c9eb159

  • SSDEEP

    49152:X/TzfPd4myhjrxvCSZTo6q6WEZAB2hMnWRI26:X/PPdKhjrxvCSZT3jNALW2

Malware Config

Targets

    • Target

      82b553f00e9aed135a2e32b96cfb3f839d1a8e12ec4e0bffeeaff84a646c870a

    • Size

      1.9MB

    • MD5

      1efc90c842fd67734e301aebb2592b09

    • SHA1

      a5a581bc531665f783b7fb6defcce550c1f8de80

    • SHA256

      82b553f00e9aed135a2e32b96cfb3f839d1a8e12ec4e0bffeeaff84a646c870a

    • SHA512

      deda5716b6884ee3dfa0a478592fcc8e227cd1ad98fc4217b1eb9fbff464d968a7b28c69b4292982d1fcabfa25adc20d30aeb70fae048b11621aabc10c9eb159

    • SSDEEP

      49152:X/TzfPd4myhjrxvCSZTo6q6WEZAB2hMnWRI26:X/PPdKhjrxvCSZT3jNALW2

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks