General

  • Target

    o.exe

  • Size

    95KB

  • Sample

    240527-r3se1afh41

  • MD5

    90d4d1e028d8be79482699f0a23eca1e

  • SHA1

    1bb39ea5ddf177aab34a990ade5bd316b85f4dda

  • SHA256

    03c10771abb8cd2ad13402826d8f69dee1f2637063d75613ece28ac557a842c4

  • SHA512

    f710d67ad1beb2f9fb4e5a61d8e2fba2b28c0f7a390ee907e1c47f9396501e60062ef66459dd6ec2962e517c642f29c323c08522e477afb7f616b062bfd31617

  • SSDEEP

    768:Jj/pxIvL2XK/MKZGJV0sLmGIQyQog5xTrbxVn2Bn6EfQthcAW9Km:5ta/M/V06IgNxzxVn2Bn6bthcMm

Malware Config

Targets

    • Target

      o.exe

    • Size

      95KB

    • MD5

      90d4d1e028d8be79482699f0a23eca1e

    • SHA1

      1bb39ea5ddf177aab34a990ade5bd316b85f4dda

    • SHA256

      03c10771abb8cd2ad13402826d8f69dee1f2637063d75613ece28ac557a842c4

    • SHA512

      f710d67ad1beb2f9fb4e5a61d8e2fba2b28c0f7a390ee907e1c47f9396501e60062ef66459dd6ec2962e517c642f29c323c08522e477afb7f616b062bfd31617

    • SSDEEP

      768:Jj/pxIvL2XK/MKZGJV0sLmGIQyQog5xTrbxVn2Bn6EfQthcAW9Km:5ta/M/V06IgNxzxVn2Bn6bthcMm

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks