General

  • Target

    b8553fc2afb30c5e1f6e4335fe2063fa6252f884b9a061947d2deb5d098fcd48

  • Size

    10.5MB

  • Sample

    240824-tzkxvsyfna

  • MD5

    fce5a75331583fe3dc2bd49a4266824b

  • SHA1

    6f390bebb84407e153b8975fe6576a0263e92b03

  • SHA256

    b8553fc2afb30c5e1f6e4335fe2063fa6252f884b9a061947d2deb5d098fcd48

  • SHA512

    de77d6a88c899b978bde7bf83fa27e5344e9e44d9ffdd91e8601de5278f2beeaae79c70261c0de30f2685aa71f94cdd442d1de3789e1fdb960437472368f9424

  • SSDEEP

    196608:WrxHqiSSJ7PbDdh0HtQba8z1sjzkAilU4I4:WrxX5J7PbDjOQba8psjzyz

Malware Config

Targets

    • Target

      b8553fc2afb30c5e1f6e4335fe2063fa6252f884b9a061947d2deb5d098fcd48

    • Size

      10.5MB

    • MD5

      fce5a75331583fe3dc2bd49a4266824b

    • SHA1

      6f390bebb84407e153b8975fe6576a0263e92b03

    • SHA256

      b8553fc2afb30c5e1f6e4335fe2063fa6252f884b9a061947d2deb5d098fcd48

    • SHA512

      de77d6a88c899b978bde7bf83fa27e5344e9e44d9ffdd91e8601de5278f2beeaae79c70261c0de30f2685aa71f94cdd442d1de3789e1fdb960437472368f9424

    • SSDEEP

      196608:WrxHqiSSJ7PbDdh0HtQba8z1sjzkAilU4I4:WrxX5J7PbDjOQba8psjzyz

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks