General

  • Target

    server.exe

  • Size

    264KB

  • Sample

    240608-zxdnnaha58

  • MD5

    f5174421d2d447e83e559968296bdc9d

  • SHA1

    11f85e5fd530506997baa7f0bfe2821d79d028d0

  • SHA256

    fc524bf0e12c4e0384455fe43c1866aa916a0be71e6589175fa55dab371c9d2e

  • SHA512

    ffdc4673e0e116530dae6d268ce6df488cf1cd2f28121149daf537173f0212d1cb6d0e3a46d45bf1ea6c164a443c3cd1121bce845877ded99fab5841c5f8be38

  • SSDEEP

    3072:q6hSrbZO8RnLIDbNu3cNkipXlL6zslKWveIiHPhgh8a+VPhgh8a+rHmY:qqyZOOnLqM3c6wVL62KtXghcghMr

Malware Config

Targets

    • Target

      server.exe

    • Size

      264KB

    • MD5

      f5174421d2d447e83e559968296bdc9d

    • SHA1

      11f85e5fd530506997baa7f0bfe2821d79d028d0

    • SHA256

      fc524bf0e12c4e0384455fe43c1866aa916a0be71e6589175fa55dab371c9d2e

    • SHA512

      ffdc4673e0e116530dae6d268ce6df488cf1cd2f28121149daf537173f0212d1cb6d0e3a46d45bf1ea6c164a443c3cd1121bce845877ded99fab5841c5f8be38

    • SSDEEP

      3072:q6hSrbZO8RnLIDbNu3cNkipXlL6zslKWveIiHPhgh8a+VPhgh8a+rHmY:qqyZOOnLqM3c6wVL62KtXghcghMr

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks