General

  • Target

    8397a6a5b9129597a029d2f25719c02db09a691f0ae0f1cca5b39733506cd219

  • Size

    198KB

  • Sample

    240624-3bzksa1bpl

  • MD5

    f602445472c76c3385d37e0d8384aea9

  • SHA1

    a220cdcf8cbac0d2d8094b5829f84c5031fd7393

  • SHA256

    8397a6a5b9129597a029d2f25719c02db09a691f0ae0f1cca5b39733506cd219

  • SHA512

    c1c123099b8e8100e76f6e288301e2581c56bdf9aa144e7e90e37fb6fe5777ee4fbae0c298a3239a1e7be99bece84bfb9bfc600f314053df38735b5e0fcfd366

  • SSDEEP

    6144:dXC4vgmhbIxs3NBR3B78Ph/SkQPnounfE/VgJBQ:dXCNi9Bf7vkRuEl

Malware Config

Targets

    • Target

      8397a6a5b9129597a029d2f25719c02db09a691f0ae0f1cca5b39733506cd219

    • Size

      198KB

    • MD5

      f602445472c76c3385d37e0d8384aea9

    • SHA1

      a220cdcf8cbac0d2d8094b5829f84c5031fd7393

    • SHA256

      8397a6a5b9129597a029d2f25719c02db09a691f0ae0f1cca5b39733506cd219

    • SHA512

      c1c123099b8e8100e76f6e288301e2581c56bdf9aa144e7e90e37fb6fe5777ee4fbae0c298a3239a1e7be99bece84bfb9bfc600f314053df38735b5e0fcfd366

    • SSDEEP

      6144:dXC4vgmhbIxs3NBR3B78Ph/SkQPnounfE/VgJBQ:dXCNi9Bf7vkRuEl

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks