General

  • Target

    be17ed22dbc7afaf283dcdd1235556fe9422635211f1e877654ba5fdac6cb196

  • Size

    405KB

  • Sample

    240525-gbfxsagb33

  • MD5

    7f0b1e2d00c4d53d30d18523137f6284

  • SHA1

    dc80c43d7ef3cf5964e9fc7fe07ae5a992fec439

  • SHA256

    be17ed22dbc7afaf283dcdd1235556fe9422635211f1e877654ba5fdac6cb196

  • SHA512

    bbde7c475223c70942aba0c1622cd473ae7d370781f3a9885400b66237f43fc79640bf26ae1e3d32ff1d328243cdf997536f1f8534b1503a3ccf5b727e4afa0c

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

Malware Config

Targets

    • Target

      be17ed22dbc7afaf283dcdd1235556fe9422635211f1e877654ba5fdac6cb196

    • Size

      405KB

    • MD5

      7f0b1e2d00c4d53d30d18523137f6284

    • SHA1

      dc80c43d7ef3cf5964e9fc7fe07ae5a992fec439

    • SHA256

      be17ed22dbc7afaf283dcdd1235556fe9422635211f1e877654ba5fdac6cb196

    • SHA512

      bbde7c475223c70942aba0c1622cd473ae7d370781f3a9885400b66237f43fc79640bf26ae1e3d32ff1d328243cdf997536f1f8534b1503a3ccf5b727e4afa0c

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks