General

  • Target

    0c1f9a81a94df6800868ff5a449e8a90N.exe

  • Size

    330KB

  • Sample

    240721-zmrsjawfkn

  • MD5

    0c1f9a81a94df6800868ff5a449e8a90

  • SHA1

    c29f6a539d64f7d123e5dac44b70cfa384e6fe16

  • SHA256

    de9a9d49b6e0f56317416f842a537d0cd6db308011f8af73d474251155bcfe68

  • SHA512

    f986254456cf318d7d2859565781d46fb2a7a70b0fb89da495bbf984c229522e9fe2f3a51c529ddd3c49fbb56fc18ca66009a0cae7f4371e86726951ba6ae5ad

  • SSDEEP

    6144:dXC4vgmhbIxs3NBBmpgs+zbDMsiAca9nS0xe/7fbYzi7jDDiJ57/:dXCNi9BgmboXVf7gi7jiJV

Malware Config

Targets

    • Target

      0c1f9a81a94df6800868ff5a449e8a90N.exe

    • Size

      330KB

    • MD5

      0c1f9a81a94df6800868ff5a449e8a90

    • SHA1

      c29f6a539d64f7d123e5dac44b70cfa384e6fe16

    • SHA256

      de9a9d49b6e0f56317416f842a537d0cd6db308011f8af73d474251155bcfe68

    • SHA512

      f986254456cf318d7d2859565781d46fb2a7a70b0fb89da495bbf984c229522e9fe2f3a51c529ddd3c49fbb56fc18ca66009a0cae7f4371e86726951ba6ae5ad

    • SSDEEP

      6144:dXC4vgmhbIxs3NBBmpgs+zbDMsiAca9nS0xe/7fbYzi7jDDiJ57/:dXCNi9BgmboXVf7gi7jiJV

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks