General

  • Target

    708610982c93031b1f8666a8bdf496f0N

  • Size

    6.0MB

  • Sample

    240908-afyvtsshrn

  • MD5

    708610982c93031b1f8666a8bdf496f0

  • SHA1

    f4e36e0624ba714fcd2c0a67f8e621f73fc3e1bd

  • SHA256

    337f970e714e24afe4f69ce24776f97f013631193b2bc9b515e570586c7a9bf4

  • SHA512

    86a9b195089243d3380a7f2817075b8839f8aca4e343fdd2d4879aee7e954e36dd6c95e5193f6a4bd2f7498d5333785619850e6769a79452ef7eaee0b5e8368a

  • SSDEEP

    98304:ZyKgr4HtnobS4p4n/h9w8/ZMiGdFqN6r0WTUeauZ1goGJR9JtCr:ZIrME4/h9HZMiGbrMeauZ1goGJPs

Malware Config

Targets

    • Target

      708610982c93031b1f8666a8bdf496f0N

    • Size

      6.0MB

    • MD5

      708610982c93031b1f8666a8bdf496f0

    • SHA1

      f4e36e0624ba714fcd2c0a67f8e621f73fc3e1bd

    • SHA256

      337f970e714e24afe4f69ce24776f97f013631193b2bc9b515e570586c7a9bf4

    • SHA512

      86a9b195089243d3380a7f2817075b8839f8aca4e343fdd2d4879aee7e954e36dd6c95e5193f6a4bd2f7498d5333785619850e6769a79452ef7eaee0b5e8368a

    • SSDEEP

      98304:ZyKgr4HtnobS4p4n/h9w8/ZMiGdFqN6r0WTUeauZ1goGJR9JtCr:ZIrME4/h9HZMiGbrMeauZ1goGJPs

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops Chrome extension

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks