General

  • Target

    5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42

  • Size

    1.3MB

  • Sample

    240516-233k3sdd64

  • MD5

    92b015956231f43ac7238abd139b1f1e

  • SHA1

    0b215d356d83c2adf80938ffd2fc071507f3959f

  • SHA256

    5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42

  • SHA512

    f2a48ddb7158250a5ce6e7c40478b29f539c97d9cb754212b790ff208f7d0f531124be90dcbc65031746f89024769b25d558bebfb603447c2ed26cc0986e5be8

  • SSDEEP

    24576:gKuwrXOk+oKl0e/FinAPJzxkuKyd0fIH+Gf6gbVU3kK:eAXOk+Vl9tnzxklyd2IeGY3D

Malware Config

Targets

    • Target

      5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42

    • Size

      1.3MB

    • MD5

      92b015956231f43ac7238abd139b1f1e

    • SHA1

      0b215d356d83c2adf80938ffd2fc071507f3959f

    • SHA256

      5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42

    • SHA512

      f2a48ddb7158250a5ce6e7c40478b29f539c97d9cb754212b790ff208f7d0f531124be90dcbc65031746f89024769b25d558bebfb603447c2ed26cc0986e5be8

    • SSDEEP

      24576:gKuwrXOk+oKl0e/FinAPJzxkuKyd0fIH+Gf6gbVU3kK:eAXOk+Vl9tnzxklyd2IeGY3D

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks