General

  • Target

    Server.exe

  • Size

    351KB

  • Sample

    240908-hgt72atgld

  • MD5

    f8a5dcac2eabec079cfee8ac1e2ef67e

  • SHA1

    e31ea67bf7bf105659c09a39078a6ba5e4563272

  • SHA256

    fdf5122030edff5285eae21fe310343e992ec380cb7d28b02bc6bad85bf47510

  • SHA512

    19e9e7db895bf705e98450a2a5e1ee193eebf084c53b9668344c9215902b67a89e0573e4b82598eaab43c32ed2cd9676ca5afce98aeb9ec647674adc9fde58f6

  • SSDEEP

    6144:fxMBXiDRG9W6ecU7ktNr8JjGBTbuEfNyz8NZKePzPl:OBu+ecvDCS94+vR

Malware Config

Targets

    • Target

      Server.exe

    • Size

      351KB

    • MD5

      f8a5dcac2eabec079cfee8ac1e2ef67e

    • SHA1

      e31ea67bf7bf105659c09a39078a6ba5e4563272

    • SHA256

      fdf5122030edff5285eae21fe310343e992ec380cb7d28b02bc6bad85bf47510

    • SHA512

      19e9e7db895bf705e98450a2a5e1ee193eebf084c53b9668344c9215902b67a89e0573e4b82598eaab43c32ed2cd9676ca5afce98aeb9ec647674adc9fde58f6

    • SSDEEP

      6144:fxMBXiDRG9W6ecU7ktNr8JjGBTbuEfNyz8NZKePzPl:OBu+ecvDCS94+vR

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks