General

  • Target

    LB3.exe

  • Size

    146KB

  • Sample

    240710-s6qk9aycjc

  • MD5

    d1fff29fe9d2e8bed2f6ea4472fbe477

  • SHA1

    e3e5f4ab7935281b2aa0f56c7b1aec24423013cc

  • SHA256

    74f20aa3be90484260777777ceb6caaebf2bcc59ff2b1e221ac71a7c03a62793

  • SHA512

    f8d16e66b0d687868884de71a2bf0cb70fbc9725ead4c305370bc3550019c94a38ebe77e82b295b05326b039b8abfe9421d7c539ccce27b0854dea6a38e8c410

  • SSDEEP

    3072:qqJogYkcSNm9V7DzIhvzO0/AbiFMPVPT:qq2kc4m9tDzMlAbi8

Malware Config

Targets

    • Target

      LB3.exe

    • Size

      146KB

    • MD5

      d1fff29fe9d2e8bed2f6ea4472fbe477

    • SHA1

      e3e5f4ab7935281b2aa0f56c7b1aec24423013cc

    • SHA256

      74f20aa3be90484260777777ceb6caaebf2bcc59ff2b1e221ac71a7c03a62793

    • SHA512

      f8d16e66b0d687868884de71a2bf0cb70fbc9725ead4c305370bc3550019c94a38ebe77e82b295b05326b039b8abfe9421d7c539ccce27b0854dea6a38e8c410

    • SSDEEP

      3072:qqJogYkcSNm9V7DzIhvzO0/AbiFMPVPT:qq2kc4m9tDzMlAbi8

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks