General

  • Target

    804c4ec6ed801fd3591a32459f5f6240N.exe

  • Size

    245KB

  • Sample

    240715-e3zsvs1bke

  • MD5

    804c4ec6ed801fd3591a32459f5f6240

  • SHA1

    0c929e0a733ac641060c8f0ace4954128a8fa640

  • SHA256

    5e8fdf4b058c311cd70026b074a98b2eb8e2604d8436daea1524c8f57a7b9667

  • SHA512

    dd8c5c36c4d5f28b6e0bc1e422556c56757cdf27ae008e490595e67b6590cd92bbec41848ecccaba29d06908109e4147d0de7bd3f3119aad7b0c8bc19665d564

  • SSDEEP

    6144:sPDLCL9Io5R4nM/40yKsx3YX7QAnCbEJ5UsoDMNYgqqa3:sPKLXqTxILxCiBOMs

Malware Config

Targets

    • Target

      804c4ec6ed801fd3591a32459f5f6240N.exe

    • Size

      245KB

    • MD5

      804c4ec6ed801fd3591a32459f5f6240

    • SHA1

      0c929e0a733ac641060c8f0ace4954128a8fa640

    • SHA256

      5e8fdf4b058c311cd70026b074a98b2eb8e2604d8436daea1524c8f57a7b9667

    • SHA512

      dd8c5c36c4d5f28b6e0bc1e422556c56757cdf27ae008e490595e67b6590cd92bbec41848ecccaba29d06908109e4147d0de7bd3f3119aad7b0c8bc19665d564

    • SSDEEP

      6144:sPDLCL9Io5R4nM/40yKsx3YX7QAnCbEJ5UsoDMNYgqqa3:sPKLXqTxILxCiBOMs

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks