General

  • Target

    e389c6e96c20473b19df5a71690c8518e4b412094a1d41e2e020a213b95fb4eb

  • Size

    710KB

  • Sample

    240624-egsseszeql

  • MD5

    9f70345df6eef4ffce89e3cd1e9bcfe9

  • SHA1

    04f8bdef9f45879f942746c1e9563b14596bd626

  • SHA256

    e389c6e96c20473b19df5a71690c8518e4b412094a1d41e2e020a213b95fb4eb

  • SHA512

    f534d5cd2ddcac50a92cb20f480393ad8865e2850bf0ae3e5f6dfb4fb766198988c233e3a401745df23fbcc04906d1409cbabd83667bcd76af6a64bd842d379e

  • SSDEEP

    12288:A//vi9BfdYmrfdQYkw+h1hbdj2FKz7fiHxRZxdPPzF7j0VIDzkxPlSvNUPdm5FAW:2wf2Y81hbkFKz76/ZxZFbDzukvNOdm5v

Malware Config

Targets

    • Target

      e389c6e96c20473b19df5a71690c8518e4b412094a1d41e2e020a213b95fb4eb

    • Size

      710KB

    • MD5

      9f70345df6eef4ffce89e3cd1e9bcfe9

    • SHA1

      04f8bdef9f45879f942746c1e9563b14596bd626

    • SHA256

      e389c6e96c20473b19df5a71690c8518e4b412094a1d41e2e020a213b95fb4eb

    • SHA512

      f534d5cd2ddcac50a92cb20f480393ad8865e2850bf0ae3e5f6dfb4fb766198988c233e3a401745df23fbcc04906d1409cbabd83667bcd76af6a64bd842d379e

    • SSDEEP

      12288:A//vi9BfdYmrfdQYkw+h1hbdj2FKz7fiHxRZxdPPzF7j0VIDzkxPlSvNUPdm5FAW:2wf2Y81hbkFKz76/ZxZFbDzukvNOdm5v

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks