General

  • Target

    CS-malware.exe

  • Size

    6.0MB

  • Sample

    240722-j9hkdaxhpq

  • MD5

    755c0350038daefb29b888b6f8739e81

  • SHA1

    5b2f56953b3c925693386cae5974251479f03928

  • SHA256

    4491901eff338ab52c85a77a3fbd3ce80fda738046ee3b7da7be468da5b331a3

  • SHA512

    fede87ea708105ea3b44680f92b97881a32235614c741e7059d8ffe356b34cbcd0c57b11464cf33f4c15af46824c0c8e8e0ef5808b5251f3acbd3d783ee60add

  • SSDEEP

    24576:RHA1jDC3rgrKPucdYUxVXshqWzHt0IBLzvavUXUjLzC:6NSwKPucuUxVX+zmvU4C

Malware Config

Targets

    • Target

      CS-malware.exe

    • Size

      6.0MB

    • MD5

      755c0350038daefb29b888b6f8739e81

    • SHA1

      5b2f56953b3c925693386cae5974251479f03928

    • SHA256

      4491901eff338ab52c85a77a3fbd3ce80fda738046ee3b7da7be468da5b331a3

    • SHA512

      fede87ea708105ea3b44680f92b97881a32235614c741e7059d8ffe356b34cbcd0c57b11464cf33f4c15af46824c0c8e8e0ef5808b5251f3acbd3d783ee60add

    • SSDEEP

      24576:RHA1jDC3rgrKPucdYUxVXshqWzHt0IBLzvavUXUjLzC:6NSwKPucuUxVX+zmvU4C

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks