General

  • Target

    JDownloaderSetup.exe

  • Size

    30.3MB

  • Sample

    240523-cm81gsac82

  • MD5

    c3c3b50075bd5c87cf500c255dd833fd

  • SHA1

    0b3593f15ebc8424919857d08d016b2cda2b5161

  • SHA256

    a43fa3db0a053119f73a7422453e54318a258a947e8c0fda294b09c52b7459fc

  • SHA512

    f9bd8c26a63b3d7cf6d6f0686a93720f9d3007ae2f196bf195815761b5a38f9fb81f2de6400abd842cc634ab68a14db6741436295a0d667e0b51099dbaf13c9d

  • SSDEEP

    786432:w+gAvXxM03iJzr2tqG533+iRdJEozAw5P0r:w+tG0SJuJpOdoh90r

Malware Config

Targets

    • Target

      JDownloaderSetup.exe

    • Size

      30.3MB

    • MD5

      c3c3b50075bd5c87cf500c255dd833fd

    • SHA1

      0b3593f15ebc8424919857d08d016b2cda2b5161

    • SHA256

      a43fa3db0a053119f73a7422453e54318a258a947e8c0fda294b09c52b7459fc

    • SHA512

      f9bd8c26a63b3d7cf6d6f0686a93720f9d3007ae2f196bf195815761b5a38f9fb81f2de6400abd842cc634ab68a14db6741436295a0d667e0b51099dbaf13c9d

    • SSDEEP

      786432:w+gAvXxM03iJzr2tqG533+iRdJEozAw5P0r:w+tG0SJuJpOdoh90r

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for any installed AV software in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Software Discovery

1
T1518

Security Software Discovery

1
T1518.001

Query Registry

2
T1012

System Information Discovery

2
T1082

Process Discovery

1
T1057

Collection

Data from Local System

1
T1005

Tasks