General

  • Target

    88f5eb66ce23818f9c456b3b507aeb80N.exe

  • Size

    350KB

  • Sample

    240719-m3r21s1cpf

  • MD5

    88f5eb66ce23818f9c456b3b507aeb80

  • SHA1

    e6d369a1baea6bad93f2bd08f73e0684b7b382b6

  • SHA256

    2a717db3136c6f1a4884717d162a29a97b5e3a82c78a364260fa275a8bea8557

  • SHA512

    c3640cc827c2e8c55f2aa0b2b5d5ae438cf74cc23f7ea2853ac82f6bc0928c5a640a28c6a8f5f4d5fb7490046582289df362b5012665b77d15b4b49dddcf1c5c

  • SSDEEP

    6144:NPDLCL+Io5R4nM/4GfZjPnl1RTouBKkoVB617dPlfzPrDoi+PwavxQbSoU50CpZL:NPKLyqufZjPnTiuBKk3fz31SjMb8

Malware Config

Targets

    • Target

      88f5eb66ce23818f9c456b3b507aeb80N.exe

    • Size

      350KB

    • MD5

      88f5eb66ce23818f9c456b3b507aeb80

    • SHA1

      e6d369a1baea6bad93f2bd08f73e0684b7b382b6

    • SHA256

      2a717db3136c6f1a4884717d162a29a97b5e3a82c78a364260fa275a8bea8557

    • SHA512

      c3640cc827c2e8c55f2aa0b2b5d5ae438cf74cc23f7ea2853ac82f6bc0928c5a640a28c6a8f5f4d5fb7490046582289df362b5012665b77d15b4b49dddcf1c5c

    • SSDEEP

      6144:NPDLCL+Io5R4nM/4GfZjPnl1RTouBKkoVB617dPlfzPrDoi+PwavxQbSoU50CpZL:NPKLyqufZjPnTiuBKk3fz31SjMb8

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks