General

  • Target

    Inquiry Items.pdf.rar

  • Size

    1KB

  • Sample

    240802-l75cgavdnj

  • MD5

    fda665accae0c03bb3cf7d271ea8f054

  • SHA1

    b7d21860ca5fdec25a04fd168678ff9b1ce2153f

  • SHA256

    81c7418f670e9e11c96094e24b35f58b37767e58e75c00866db1d2fe471b77f7

  • SHA512

    d98b08f78ade5653abef2b770cf193c00b9d6b43a603d1a12561aa1c3b3ede5dd6c3cca9a5addd50032f6f4c69c220a29fd38b00539240d21f61c616487638f7

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://dq8d.shop/YRAZiDez/hta182024.hta

Extracted

Language
hta
Source
URLs
hta.dropper

https://dq8d.shop/YRAZiDez/hta182024.hta

Targets

    • Target

      Inquiry Items.pdf.lnk

    • Size

      3KB

    • MD5

      f2bbeb375a6d74abd720c40702af7446

    • SHA1

      42956957fcf61560d4871f5d819d30de12663fb4

    • SHA256

      d5316a106da0577abdd0d1c901c0d26793bac9933eb6ca55a42e22c08ad29ad0

    • SHA512

      cddc5bf3a8df6844720bea808d9786b5d2fc0b15baf990ef48481e6ccf4a157000d4d437c7f1975ceb22e3c47850476ffdf319db7d7c10782c3f1336b1f8d8b6

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks