General

  • Target

    077f33dfd672e500ae63b6ee7f3da690f49e2b686480a95004833981ec795504.exe

  • Size

    71.3MB

  • Sample

    240624-pptpsssbpa

  • MD5

    faf5656e3b7521608001a0f0f9489420

  • SHA1

    6c60b1365df48822e7d041a37dd0cd4f842f4666

  • SHA256

    077f33dfd672e500ae63b6ee7f3da690f49e2b686480a95004833981ec795504

  • SHA512

    c625345bc2ad402dbcb6807f9706e6c228a2c370c0347bc02781cdcf654f299f53f1e61986af45b037b3cdb0d1713ac8b136858619cbb2dca2cb3c0f87f40a11

  • SSDEEP

    1572864:j4/4rzOchPJlnVL9jf9Tshlax5rJtz6hWidkFTYsWF4BDIOHVWl1ZfPSnP7T672K:ckqcdPVncsxHohViYfOUJfPS6iS7

Malware Config

Targets

    • Target

      077f33dfd672e500ae63b6ee7f3da690f49e2b686480a95004833981ec795504.exe

    • Size

      71.3MB

    • MD5

      faf5656e3b7521608001a0f0f9489420

    • SHA1

      6c60b1365df48822e7d041a37dd0cd4f842f4666

    • SHA256

      077f33dfd672e500ae63b6ee7f3da690f49e2b686480a95004833981ec795504

    • SHA512

      c625345bc2ad402dbcb6807f9706e6c228a2c370c0347bc02781cdcf654f299f53f1e61986af45b037b3cdb0d1713ac8b136858619cbb2dca2cb3c0f87f40a11

    • SSDEEP

      1572864:j4/4rzOchPJlnVL9jf9Tshlax5rJtz6hWidkFTYsWF4BDIOHVWl1ZfPSnP7T672K:ckqcdPVncsxHohViYfOUJfPS6iS7

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks