General

  • Target

    1d370459a32b1d32a2f99bb09fc139c2591d755687a6ef0350ba128a71910043

  • Size

    476KB

  • Sample

    240616-xzyqhaxfjj

  • MD5

    d657b4296f4f4bb22c81167805d603cf

  • SHA1

    f754415865cd2602b3906ba541d5fefe8b740799

  • SHA256

    1d370459a32b1d32a2f99bb09fc139c2591d755687a6ef0350ba128a71910043

  • SHA512

    ad9a2a3f1bbe491c94bed3624054b8318bae110377c2a0a6f5ef39dc4809cde7075fbcdc4e745bf1ae5dd0ecc0a2c798736118e1deefe962a794ceb3a05f2e2b

  • SSDEEP

    12288:dXCNi9B7kFFlZhPnKWr5cJOUygTA8q6B76s:oWIdhPnj59UtXl

Malware Config

Targets

    • Target

      1d370459a32b1d32a2f99bb09fc139c2591d755687a6ef0350ba128a71910043

    • Size

      476KB

    • MD5

      d657b4296f4f4bb22c81167805d603cf

    • SHA1

      f754415865cd2602b3906ba541d5fefe8b740799

    • SHA256

      1d370459a32b1d32a2f99bb09fc139c2591d755687a6ef0350ba128a71910043

    • SHA512

      ad9a2a3f1bbe491c94bed3624054b8318bae110377c2a0a6f5ef39dc4809cde7075fbcdc4e745bf1ae5dd0ecc0a2c798736118e1deefe962a794ceb3a05f2e2b

    • SSDEEP

      12288:dXCNi9B7kFFlZhPnKWr5cJOUygTA8q6B76s:oWIdhPnj59UtXl

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks