General

  • Target

    19eac162665903722e90df45f943ef2207c294b9f3a969e1a6a3727f4d82277a

  • Size

    10.5MB

  • Sample

    240814-dag7nsvgje

  • MD5

    b510ca99b7f03e17b0cb4b3a1ec68338

  • SHA1

    94f1d7b4566ab181adda85fe0493107405c51222

  • SHA256

    19eac162665903722e90df45f943ef2207c294b9f3a969e1a6a3727f4d82277a

  • SHA512

    0e95e5012d7e09f98df973359fb0c7ca8c01cc3e63c3fa7846ee51deca2685c8b03eadf09a1b689e69a608b5ed289ab9f7428a00cdf9d79f57c7908572b5fe70

  • SSDEEP

    196608:0bGKPyHbSSJ7PbDdh0HtQba8z1sjzkAilU4I4:0KKPe5J7PbDjOQba8psjzyz

Malware Config

Targets

    • Target

      19eac162665903722e90df45f943ef2207c294b9f3a969e1a6a3727f4d82277a

    • Size

      10.5MB

    • MD5

      b510ca99b7f03e17b0cb4b3a1ec68338

    • SHA1

      94f1d7b4566ab181adda85fe0493107405c51222

    • SHA256

      19eac162665903722e90df45f943ef2207c294b9f3a969e1a6a3727f4d82277a

    • SHA512

      0e95e5012d7e09f98df973359fb0c7ca8c01cc3e63c3fa7846ee51deca2685c8b03eadf09a1b689e69a608b5ed289ab9f7428a00cdf9d79f57c7908572b5fe70

    • SSDEEP

      196608:0bGKPyHbSSJ7PbDdh0HtQba8z1sjzkAilU4I4:0KKPe5J7PbDjOQba8psjzyz

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks