General

  • Target

    f6ea8264da808f450c2afbd0025a95dd6676f2fe924f06a3266ab70893f4f8f5

  • Size

    459KB

  • Sample

    240529-es647aah85

  • MD5

    58cca147a43b198d1252e089db8ccfd1

  • SHA1

    145a3a77e5100617dc02194dd6c1e2dc1e2227df

  • SHA256

    f6ea8264da808f450c2afbd0025a95dd6676f2fe924f06a3266ab70893f4f8f5

  • SHA512

    dbf6ce82a06a9603a62c108dd0c4d754ccb1fb22233a8868746abf653f6a7eb1b7f93cc190cbdb38cf286e0bd7c3020289ad64bc8e286d8007112b259728cb55

  • SSDEEP

    12288:bEQoSx0qJjYaZrGGujS3uwX35KFx3+OJke:bH/YaZZzX35KjuFe

Malware Config

Targets

    • Target

      f6ea8264da808f450c2afbd0025a95dd6676f2fe924f06a3266ab70893f4f8f5

    • Size

      459KB

    • MD5

      58cca147a43b198d1252e089db8ccfd1

    • SHA1

      145a3a77e5100617dc02194dd6c1e2dc1e2227df

    • SHA256

      f6ea8264da808f450c2afbd0025a95dd6676f2fe924f06a3266ab70893f4f8f5

    • SHA512

      dbf6ce82a06a9603a62c108dd0c4d754ccb1fb22233a8868746abf653f6a7eb1b7f93cc190cbdb38cf286e0bd7c3020289ad64bc8e286d8007112b259728cb55

    • SSDEEP

      12288:bEQoSx0qJjYaZrGGujS3uwX35KFx3+OJke:bH/YaZZzX35KjuFe

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks