General

  • Target

    ORDER CONFIRMATIONS MAIN STORE USP-PO-2403103 USP-PR-2024.scr.exe

  • Size

    1.2MB

  • Sample

    240531-jletkscd63

  • MD5

    65381bc5947270a4cd95fc31359c70f3

  • SHA1

    c9d54bf3730a72f5fa7ab92659ea1874d539297e

  • SHA256

    9681f60064bcf9cb185d49d8fc355fa75daef418188f0a20db66a96884f14733

  • SHA512

    064d6c12c3123db1c2617ef2f19cbd48a9e52e232b67b9fb992d00c1a056b3ca2030a45e63cd4b49dc4075c8351f1cada740c4c622186fed172aa5cb73b26820

  • SSDEEP

    24576:nOdyJRGkkkHmk1538alCRmlCqyKDZae6ts91hO2ak2yrF+BOtu:nSyH9kEmkP35C0lCqFo5S/aklJ+ot

Malware Config

Targets

    • Target

      ORDER CONFIRMATIONS MAIN STORE USP-PO-2403103 USP-PR-2024.scr.exe

    • Size

      1.2MB

    • MD5

      65381bc5947270a4cd95fc31359c70f3

    • SHA1

      c9d54bf3730a72f5fa7ab92659ea1874d539297e

    • SHA256

      9681f60064bcf9cb185d49d8fc355fa75daef418188f0a20db66a96884f14733

    • SHA512

      064d6c12c3123db1c2617ef2f19cbd48a9e52e232b67b9fb992d00c1a056b3ca2030a45e63cd4b49dc4075c8351f1cada740c4c622186fed172aa5cb73b26820

    • SSDEEP

      24576:nOdyJRGkkkHmk1538alCRmlCqyKDZae6ts91hO2ak2yrF+BOtu:nSyH9kEmkP35C0lCqFo5S/aklJ+ot

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks