General

  • Target

    a838c8d9360233ab7ec18b448a712d863d458dd1a54d26e18e1f252dda4abc16

  • Size

    751KB

  • Sample

    240620-bzwp9a1fna

  • MD5

    45483e7b9e8220de64e2586c35de15cd

  • SHA1

    e28c2574418c3e916dcc5d743da20dece36788c7

  • SHA256

    a838c8d9360233ab7ec18b448a712d863d458dd1a54d26e18e1f252dda4abc16

  • SHA512

    ab16e6a98c01c93c39aa90f5f2057bb55ef10da92ce7a504822589bbd5ae3c56620e673e0042e8fef5f624ba890a284a16dfca6b09aca6dd6f0332778a8b5ebd

  • SSDEEP

    12288:dXCNi9BuV+zbZKyurTpn8tMAFbgvKvgIEbO9kXcPgk9plwylaptHp0PKmIIzzZ:oWuV+h7urTp8rFPYID9kX0qiQJGvFzzZ

Malware Config

Targets

    • Target

      a838c8d9360233ab7ec18b448a712d863d458dd1a54d26e18e1f252dda4abc16

    • Size

      751KB

    • MD5

      45483e7b9e8220de64e2586c35de15cd

    • SHA1

      e28c2574418c3e916dcc5d743da20dece36788c7

    • SHA256

      a838c8d9360233ab7ec18b448a712d863d458dd1a54d26e18e1f252dda4abc16

    • SHA512

      ab16e6a98c01c93c39aa90f5f2057bb55ef10da92ce7a504822589bbd5ae3c56620e673e0042e8fef5f624ba890a284a16dfca6b09aca6dd6f0332778a8b5ebd

    • SSDEEP

      12288:dXCNi9BuV+zbZKyurTpn8tMAFbgvKvgIEbO9kXcPgk9plwylaptHp0PKmIIzzZ:oWuV+h7urTp8rFPYID9kX0qiQJGvFzzZ

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks