General

  • Target

    bf81b2e70666edffca20d881464b6dfdaa036a5fc6ee7ed90f4ab5a82c14b2cb

  • Size

    807KB

  • Sample

    240603-dp5arahb6w

  • MD5

    77141c566dfb6dd1c53eb347acccb744

  • SHA1

    1367b873c27feef575eb9f6b15ef6b968afa2315

  • SHA256

    bf81b2e70666edffca20d881464b6dfdaa036a5fc6ee7ed90f4ab5a82c14b2cb

  • SHA512

    9fabfff57329d1adfd1616598188dc25dd321b0405b96067de3dadd2d32b2976bc93dccbc3842fc0b3f36bc573b6acf9a91b43ef6a5024f2ad15430e4dcf7e62

  • SSDEEP

    12288:xEQoS+qhzMRei7BunvxPApWm0yLjB/oK+lFkNBBGgwTyBinv6uJjm8Syz4Q:xnzManvxIn0EX+lqnBLOyBinJJC8SNQ

Malware Config

Targets

    • Target

      bf81b2e70666edffca20d881464b6dfdaa036a5fc6ee7ed90f4ab5a82c14b2cb

    • Size

      807KB

    • MD5

      77141c566dfb6dd1c53eb347acccb744

    • SHA1

      1367b873c27feef575eb9f6b15ef6b968afa2315

    • SHA256

      bf81b2e70666edffca20d881464b6dfdaa036a5fc6ee7ed90f4ab5a82c14b2cb

    • SHA512

      9fabfff57329d1adfd1616598188dc25dd321b0405b96067de3dadd2d32b2976bc93dccbc3842fc0b3f36bc573b6acf9a91b43ef6a5024f2ad15430e4dcf7e62

    • SSDEEP

      12288:xEQoS+qhzMRei7BunvxPApWm0yLjB/oK+lFkNBBGgwTyBinv6uJjm8Syz4Q:xnzManvxIn0EX+lqnBLOyBinJJC8SNQ

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks