General

  • Target

    a7bb21bf9decc86a9eca9ea2ff17b77c8d8eeb97d7080442cab93c7f442aa609

  • Size

    354KB

  • Sample

    240510-bnvzksac6x

  • MD5

    5e7ca0360b76151f03435e414b5b39b3

  • SHA1

    996189be3e54435087d7fc55c7da6ef0251d3d81

  • SHA256

    a7bb21bf9decc86a9eca9ea2ff17b77c8d8eeb97d7080442cab93c7f442aa609

  • SHA512

    3873e724d5c983a48dd3fbaa56465f2b46c10968f07988dba4bd6f1db4cfc37d8d9690192e473ab0d64b4dd372eb21baad74f75b6998da1fd94bbcf0ba83df2c

  • SSDEEP

    6144:0fp18znPaTavhPvnenut3drPAFl3oAOYk22zVstTtsOkz:0fp18wihPvncK3iYmkXqhsO

Malware Config

Targets

    • Target

      a7bb21bf9decc86a9eca9ea2ff17b77c8d8eeb97d7080442cab93c7f442aa609

    • Size

      354KB

    • MD5

      5e7ca0360b76151f03435e414b5b39b3

    • SHA1

      996189be3e54435087d7fc55c7da6ef0251d3d81

    • SHA256

      a7bb21bf9decc86a9eca9ea2ff17b77c8d8eeb97d7080442cab93c7f442aa609

    • SHA512

      3873e724d5c983a48dd3fbaa56465f2b46c10968f07988dba4bd6f1db4cfc37d8d9690192e473ab0d64b4dd372eb21baad74f75b6998da1fd94bbcf0ba83df2c

    • SSDEEP

      6144:0fp18znPaTavhPvnenut3drPAFl3oAOYk22zVstTtsOkz:0fp18wihPvncK3iYmkXqhsO

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks