General

  • Target

    1f3b8f440dda0e2fb9bfa83d83ee0ca0N.exe

  • Size

    1.6MB

  • Sample

    240721-2hryvayalc

  • MD5

    1f3b8f440dda0e2fb9bfa83d83ee0ca0

  • SHA1

    3478fdbffdfee9da7a4f9f7d4ad7babff877dbce

  • SHA256

    0ff5892327ff695bbe7bf57bab596adef934a076ee876ed57cf36670c8853a5b

  • SHA512

    aa5d8ac5bb873754ca4cdd6ad6a5d8a3658e0b8b5b1368ba2a9f66ee3d1eb8c4273d65be83b917979eb2a737ecbf17ab37ffcac520a4c4f8c14febd20a84d5e4

  • SSDEEP

    49152:CPif+Lu/de09SIhsOBrtMklt3/M/uNVUA:46w0de09SIyOzMkltko

Malware Config

Targets

    • Target

      1f3b8f440dda0e2fb9bfa83d83ee0ca0N.exe

    • Size

      1.6MB

    • MD5

      1f3b8f440dda0e2fb9bfa83d83ee0ca0

    • SHA1

      3478fdbffdfee9da7a4f9f7d4ad7babff877dbce

    • SHA256

      0ff5892327ff695bbe7bf57bab596adef934a076ee876ed57cf36670c8853a5b

    • SHA512

      aa5d8ac5bb873754ca4cdd6ad6a5d8a3658e0b8b5b1368ba2a9f66ee3d1eb8c4273d65be83b917979eb2a737ecbf17ab37ffcac520a4c4f8c14febd20a84d5e4

    • SSDEEP

      49152:CPif+Lu/de09SIhsOBrtMklt3/M/uNVUA:46w0de09SIyOzMkltko

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks