General

  • Target

    079ae75f45e81e1f49c2a68207118c8c36ae66ccde81c9bad22118b4a405a826

  • Size

    919KB

  • Sample

    240628-wza4rsybmd

  • MD5

    99d5523affbc8a28bd7ed7d2cd3ac2c7

  • SHA1

    c35abeed5499550236e5e55e1c089ca95568ff47

  • SHA256

    079ae75f45e81e1f49c2a68207118c8c36ae66ccde81c9bad22118b4a405a826

  • SHA512

    465a2c7007bc2de7a014965541c25ab31480968920b469868a5a1bd3befe32492c22b097a115399dc70eb62320ecf6d1af488eb1c13fb425d78854099bdaa15d

  • SSDEEP

    24576:sWLSCGmV2XAuaIYRa24T/Ay7+L2ghjA0PHHzI3uNn:BLlG5GS/A5amjJPH6Y

Malware Config

Targets

    • Target

      079ae75f45e81e1f49c2a68207118c8c36ae66ccde81c9bad22118b4a405a826

    • Size

      919KB

    • MD5

      99d5523affbc8a28bd7ed7d2cd3ac2c7

    • SHA1

      c35abeed5499550236e5e55e1c089ca95568ff47

    • SHA256

      079ae75f45e81e1f49c2a68207118c8c36ae66ccde81c9bad22118b4a405a826

    • SHA512

      465a2c7007bc2de7a014965541c25ab31480968920b469868a5a1bd3befe32492c22b097a115399dc70eb62320ecf6d1af488eb1c13fb425d78854099bdaa15d

    • SSDEEP

      24576:sWLSCGmV2XAuaIYRa24T/Ay7+L2ghjA0PHHzI3uNn:BLlG5GS/A5amjJPH6Y

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks