General

  • Target

    a8bba148e67b9b9c519d81f01a4d1ec93324416669e438c6add216d960bce168

  • Size

    10.4MB

  • Sample

    240819-kgp97atfme

  • MD5

    468477a95ffbb3a2ccb26b88a06677bb

  • SHA1

    7e7c97c992631d49b96c9afd3e3392d180748442

  • SHA256

    a8bba148e67b9b9c519d81f01a4d1ec93324416669e438c6add216d960bce168

  • SHA512

    b373677e9ad1837601774c85213fc7c67ab7d94f32ebf76036c6584df0516d86cd5420a53d21ee19423d76d7d5fd68b4e09a47437db74568c8d7e42beebe2041

  • SSDEEP

    196608:gUZWC2SSJ7PbDdh0HtQba8z1sjzkAilU4I4:gUZB25J7PbDjOQba8psjzyz

Malware Config

Targets

    • Target

      a8bba148e67b9b9c519d81f01a4d1ec93324416669e438c6add216d960bce168

    • Size

      10.4MB

    • MD5

      468477a95ffbb3a2ccb26b88a06677bb

    • SHA1

      7e7c97c992631d49b96c9afd3e3392d180748442

    • SHA256

      a8bba148e67b9b9c519d81f01a4d1ec93324416669e438c6add216d960bce168

    • SHA512

      b373677e9ad1837601774c85213fc7c67ab7d94f32ebf76036c6584df0516d86cd5420a53d21ee19423d76d7d5fd68b4e09a47437db74568c8d7e42beebe2041

    • SSDEEP

      196608:gUZWC2SSJ7PbDdh0HtQba8z1sjzkAilU4I4:gUZB25J7PbDjOQba8psjzyz

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks