General

  • Target

    035a35a3b87c8ffd7a1fb4ed55358676c890e4b7f6fc84b5f30ed52434f8906e

  • Size

    2.0MB

  • Sample

    240628-wref8ayajg

  • MD5

    820758746ba5db6316edb3e5066e49a6

  • SHA1

    18d13e3b3d60496bdb9455393564b1122c103e6c

  • SHA256

    035a35a3b87c8ffd7a1fb4ed55358676c890e4b7f6fc84b5f30ed52434f8906e

  • SHA512

    ecf00c948c37f81fe8c1d5924aca154954315851fdb0e1e5bf94e81646df49e2afc8f8518a116033526049e7536394e53469ca3c37579d8e9c3ce72ffc79fdca

  • SSDEEP

    49152:VDfw7GaXYEt3GiouiE/v2Bs81cj714qEt3fRCNH3pIAOQ:9mYEGurwsMcj71rC3ZID

Malware Config

Targets

    • Target

      035a35a3b87c8ffd7a1fb4ed55358676c890e4b7f6fc84b5f30ed52434f8906e

    • Size

      2.0MB

    • MD5

      820758746ba5db6316edb3e5066e49a6

    • SHA1

      18d13e3b3d60496bdb9455393564b1122c103e6c

    • SHA256

      035a35a3b87c8ffd7a1fb4ed55358676c890e4b7f6fc84b5f30ed52434f8906e

    • SHA512

      ecf00c948c37f81fe8c1d5924aca154954315851fdb0e1e5bf94e81646df49e2afc8f8518a116033526049e7536394e53469ca3c37579d8e9c3ce72ffc79fdca

    • SSDEEP

      49152:VDfw7GaXYEt3GiouiE/v2Bs81cj714qEt3fRCNH3pIAOQ:9mYEGurwsMcj71rC3ZID

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks