General

  • Target

    e769b99715b28e35c0c57e88f9fabb1644e023fac9b613d7456824ca959bfc52

  • Size

    697KB

  • Sample

    240620-ffm18azcje

  • MD5

    86c6fe3303a80fac882239e2014910f3

  • SHA1

    438b5051d686e6b3845edd4c7e82afea981e2a11

  • SHA256

    e769b99715b28e35c0c57e88f9fabb1644e023fac9b613d7456824ca959bfc52

  • SHA512

    ed81d22b3352ff1198ceb290005d785116e9deb9704f84568ac94d33a8a0e37b37bf79ad8ebfdd8afe6a29020adaad0fc26027fca66fc0d152a10eab1be8a8d2

  • SSDEEP

    12288:JXCNi9By+pl90SYeUUo7J9hz+ZvrBWMVkM2WONxEcn6qPGiRVqJUgzRDAjyo1zZu:sWVlEv7Dh4/VH4EMwK6UoyjVzZQrz

Malware Config

Targets

    • Target

      e769b99715b28e35c0c57e88f9fabb1644e023fac9b613d7456824ca959bfc52

    • Size

      697KB

    • MD5

      86c6fe3303a80fac882239e2014910f3

    • SHA1

      438b5051d686e6b3845edd4c7e82afea981e2a11

    • SHA256

      e769b99715b28e35c0c57e88f9fabb1644e023fac9b613d7456824ca959bfc52

    • SHA512

      ed81d22b3352ff1198ceb290005d785116e9deb9704f84568ac94d33a8a0e37b37bf79ad8ebfdd8afe6a29020adaad0fc26027fca66fc0d152a10eab1be8a8d2

    • SSDEEP

      12288:JXCNi9By+pl90SYeUUo7J9hz+ZvrBWMVkM2WONxEcn6qPGiRVqJUgzRDAjyo1zZu:sWVlEv7Dh4/VH4EMwK6UoyjVzZQrz

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks