General

  • Target

    3465791e7d699ec831a083a1a4dff360N.exe

  • Size

    396KB

  • Sample

    240713-c7l2fsvbrf

  • MD5

    3465791e7d699ec831a083a1a4dff360

  • SHA1

    93123d9e09d2f9b4dafaabef7aa9c4ee48dfd5af

  • SHA256

    9fb657d927b5ab33ba7f0afbbcee2ecb92c681e23dd9f6437da52ad031ac5143

  • SHA512

    77826f8418fd83f10298b86461707dc35b67864a3fe603140f489a397e01a44327c1955a313c81b3e442cc351c44c24867efe291af6798793c207999c2d94942

  • SSDEEP

    12288:OWji9BB2wpEzb8GKT+d4h/adoS8wSnCMK:CBOjcXST+K

Malware Config

Targets

    • Target

      3465791e7d699ec831a083a1a4dff360N.exe

    • Size

      396KB

    • MD5

      3465791e7d699ec831a083a1a4dff360

    • SHA1

      93123d9e09d2f9b4dafaabef7aa9c4ee48dfd5af

    • SHA256

      9fb657d927b5ab33ba7f0afbbcee2ecb92c681e23dd9f6437da52ad031ac5143

    • SHA512

      77826f8418fd83f10298b86461707dc35b67864a3fe603140f489a397e01a44327c1955a313c81b3e442cc351c44c24867efe291af6798793c207999c2d94942

    • SSDEEP

      12288:OWji9BB2wpEzb8GKT+d4h/adoS8wSnCMK:CBOjcXST+K

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks