General

  • Target

    d621d920f19a1b550b052307327b8e92126c1ac0c92b107d80ca86e122fbfad3

  • Size

    10.5MB

  • Sample

    240826-dhlvts1ejh

  • MD5

    8c324bdbea5b2efa9908a83b31a18189

  • SHA1

    ada87999dd1ba2a290935550840b376ddd937ab3

  • SHA256

    d621d920f19a1b550b052307327b8e92126c1ac0c92b107d80ca86e122fbfad3

  • SHA512

    087d0a6e35add76c451b4f8677a991a5bbfd04a2a92fd89125b9db1cb9666699dac3b3d1af85af239ee5a1b0e1b8b61e6afea0ec68e86a3f4787acdaf0251107

  • SSDEEP

    196608:WrxHqiSSJ7PbDdh0HtQba8z1sjzkAilU4I4:WrxX5J7PbDjOQba8psjzyz

Malware Config

Targets

    • Target

      d621d920f19a1b550b052307327b8e92126c1ac0c92b107d80ca86e122fbfad3

    • Size

      10.5MB

    • MD5

      8c324bdbea5b2efa9908a83b31a18189

    • SHA1

      ada87999dd1ba2a290935550840b376ddd937ab3

    • SHA256

      d621d920f19a1b550b052307327b8e92126c1ac0c92b107d80ca86e122fbfad3

    • SHA512

      087d0a6e35add76c451b4f8677a991a5bbfd04a2a92fd89125b9db1cb9666699dac3b3d1af85af239ee5a1b0e1b8b61e6afea0ec68e86a3f4787acdaf0251107

    • SSDEEP

      196608:WrxHqiSSJ7PbDdh0HtQba8z1sjzkAilU4I4:WrxX5J7PbDjOQba8psjzyz

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks