General

  • Target

    8a45463cda8de6985cb403c4c1d6433927112e81659d18994be217c51c6ef22e

  • Size

    435KB

  • Sample

    240612-ayppwawhlr

  • MD5

    33a9256c1c92906f65dd3714812d7e6a

  • SHA1

    b89dfc8fa4e11892797ec9a2b70d0a8c49dcf2e9

  • SHA256

    8a45463cda8de6985cb403c4c1d6433927112e81659d18994be217c51c6ef22e

  • SHA512

    1b9bde16c4554981d81e042737ae3fa493acb0963e2db77db91db5ca643a5ea84bcbafa0d57a62b094e8b7fa4c5d6fa26de236188c140745d39e3ad7bab19758

  • SSDEEP

    12288:YEQoSnqhFwlhhB0PvMgDnFHmCEQPAcKoqFVAZXjYL/O:YoFohsPEgDnFGNfRczYa

Malware Config

Targets

    • Target

      8a45463cda8de6985cb403c4c1d6433927112e81659d18994be217c51c6ef22e

    • Size

      435KB

    • MD5

      33a9256c1c92906f65dd3714812d7e6a

    • SHA1

      b89dfc8fa4e11892797ec9a2b70d0a8c49dcf2e9

    • SHA256

      8a45463cda8de6985cb403c4c1d6433927112e81659d18994be217c51c6ef22e

    • SHA512

      1b9bde16c4554981d81e042737ae3fa493acb0963e2db77db91db5ca643a5ea84bcbafa0d57a62b094e8b7fa4c5d6fa26de236188c140745d39e3ad7bab19758

    • SSDEEP

      12288:YEQoSnqhFwlhhB0PvMgDnFHmCEQPAcKoqFVAZXjYL/O:YoFohsPEgDnFGNfRczYa

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks