General

  • Target

    33edb139f84bc332a7ccc4b996ac1e4f8e099314ce9b77ec5d8612eb26739008

  • Size

    10.4MB

  • Sample

    240818-hvp58ssale

  • MD5

    8fca048e9250770dcf929d8104e6c7e7

  • SHA1

    ea68a50e0b67baa86ce8fcb42f52889f6cc5e3a9

  • SHA256

    33edb139f84bc332a7ccc4b996ac1e4f8e099314ce9b77ec5d8612eb26739008

  • SHA512

    75574d1f9eae18038b3060bffccd37d2eac83cc2e65020aaada9b8d557a558ce2cd2dd50aa70c282c0e7cb9d34f07d09c7f0a867f7e542f7099a50aa41b43042

  • SSDEEP

    196608:gUZWC2SSJ7PbDdh0HtQba8z1sjzkAilU4I4:gUZB25J7PbDjOQba8psjzyz

Malware Config

Targets

    • Target

      33edb139f84bc332a7ccc4b996ac1e4f8e099314ce9b77ec5d8612eb26739008

    • Size

      10.4MB

    • MD5

      8fca048e9250770dcf929d8104e6c7e7

    • SHA1

      ea68a50e0b67baa86ce8fcb42f52889f6cc5e3a9

    • SHA256

      33edb139f84bc332a7ccc4b996ac1e4f8e099314ce9b77ec5d8612eb26739008

    • SHA512

      75574d1f9eae18038b3060bffccd37d2eac83cc2e65020aaada9b8d557a558ce2cd2dd50aa70c282c0e7cb9d34f07d09c7f0a867f7e542f7099a50aa41b43042

    • SSDEEP

      196608:gUZWC2SSJ7PbDdh0HtQba8z1sjzkAilU4I4:gUZB25J7PbDjOQba8psjzyz

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks