Resubmissions

05/08/2024, 21:18

240805-z5pe5asdqc 8

05/08/2024, 17:39

240805-v8n7baxape 10

General

  • Target

    Install.exe

  • Size

    6.4MB

  • Sample

    240805-z5pe5asdqc

  • MD5

    1b1d3711ab31cc870f6c22cadaf6d8fb

  • SHA1

    aa7f3547506a7a7684e495a8c68e13f356065942

  • SHA256

    d92fecfcce66d9c06f7d5b5571ba658417c8f60011273bda3a84c2c2615e3609

  • SHA512

    6ea460d85e365910cfc3511c78c31aff4cdaaf7e2b1f8eb4e31e35fc08770bf426b08626f454dcf8ca9bc220015e501a0ebc69d741c4cf314a8e4446ea63004c

  • SSDEEP

    196608:91OIKkeJ1rTP9XOH3wSvMs9YChln0E6edxa1f:3OIKPTyLGeeENw1f

Malware Config

Targets

    • Target

      Install.exe

    • Size

      6.4MB

    • MD5

      1b1d3711ab31cc870f6c22cadaf6d8fb

    • SHA1

      aa7f3547506a7a7684e495a8c68e13f356065942

    • SHA256

      d92fecfcce66d9c06f7d5b5571ba658417c8f60011273bda3a84c2c2615e3609

    • SHA512

      6ea460d85e365910cfc3511c78c31aff4cdaaf7e2b1f8eb4e31e35fc08770bf426b08626f454dcf8ca9bc220015e501a0ebc69d741c4cf314a8e4446ea63004c

    • SSDEEP

      196608:91OIKkeJ1rTP9XOH3wSvMs9YChln0E6edxa1f:3OIKPTyLGeeENw1f

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indirect Command Execution

      Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks