General

  • Target

    0d9bf457aa1a369109245273de10a502c6554e329899e8690d69e5b16bb92217

  • Size

    7.3MB

  • Sample

    240706-rnxfeazgrp

  • MD5

    715f65428cafa359af16c4446c8f1734

  • SHA1

    ba7452e7712dbc26e0e00764b02ecb20da3f8583

  • SHA256

    0d9bf457aa1a369109245273de10a502c6554e329899e8690d69e5b16bb92217

  • SHA512

    4fb2075578e1d3e0b1f62cff238dd3c3fc34dd5e201ba475fbf5ad88bc93abd66948fb112668e51bb5357e6097c54d53cd95385bd94b2189b7eebcbccf0be5f6

  • SSDEEP

    196608:91OxvZfZCSq8mTGdDKdMI6LkaUnPLjtRx9pPwwBeynmBCZsYsKV2QQ:3Oxvh5qQd0fZV/nx9pdmBCZssVLQ

Malware Config

Targets

    • Target

      0d9bf457aa1a369109245273de10a502c6554e329899e8690d69e5b16bb92217

    • Size

      7.3MB

    • MD5

      715f65428cafa359af16c4446c8f1734

    • SHA1

      ba7452e7712dbc26e0e00764b02ecb20da3f8583

    • SHA256

      0d9bf457aa1a369109245273de10a502c6554e329899e8690d69e5b16bb92217

    • SHA512

      4fb2075578e1d3e0b1f62cff238dd3c3fc34dd5e201ba475fbf5ad88bc93abd66948fb112668e51bb5357e6097c54d53cd95385bd94b2189b7eebcbccf0be5f6

    • SSDEEP

      196608:91OxvZfZCSq8mTGdDKdMI6LkaUnPLjtRx9pPwwBeynmBCZsYsKV2QQ:3Oxvh5qQd0fZV/nx9pdmBCZssVLQ

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks