General

  • Target

    Fluent.exe

  • Size

    3.1MB

  • Sample

    240825-qty1raycnm

  • MD5

    15e81b6e3999600603d0f8b0dd22c33e

  • SHA1

    8b76e5db4c4344dc6a011310892d026f2ff95906

  • SHA256

    3a809ac2c5f55a839e15387cb84eba8adee8f402fda2736894d797a57b3e2eb1

  • SHA512

    d66610e57ea0138540d414756a8c610e5b38add2dd35f2f1d11cfe1cc5fb320f8a54db4f7a5511cee7187d508c76e62f3e44de17f51fdab0e798dba7202072a4

  • SSDEEP

    98304:FewFpuCoX7qd6lHRQJjZUd4lTpOrGRzHsAgaAYC1AH:copuCoOyHRQJjZUdPrcHsAgaAYC1Q

Malware Config

Targets

    • Target

      Fluent.exe

    • Size

      3.1MB

    • MD5

      15e81b6e3999600603d0f8b0dd22c33e

    • SHA1

      8b76e5db4c4344dc6a011310892d026f2ff95906

    • SHA256

      3a809ac2c5f55a839e15387cb84eba8adee8f402fda2736894d797a57b3e2eb1

    • SHA512

      d66610e57ea0138540d414756a8c610e5b38add2dd35f2f1d11cfe1cc5fb320f8a54db4f7a5511cee7187d508c76e62f3e44de17f51fdab0e798dba7202072a4

    • SSDEEP

      98304:FewFpuCoX7qd6lHRQJjZUd4lTpOrGRzHsAgaAYC1AH:copuCoOyHRQJjZUdPrcHsAgaAYC1Q

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks