General

  • Target

    2d7d74c8204fe26ebd41564b92a80b80N

  • Size

    6.4MB

  • Sample

    240909-ssf5naxdqb

  • MD5

    2d7d74c8204fe26ebd41564b92a80b80

  • SHA1

    9425f442d8f6d7b0833609862df97b72296e4dde

  • SHA256

    1cbef57927e013839abbd5a6e996b5f331ade9268c2962a411c77f60f321b144

  • SHA512

    b3a20058bc2ac12b493db5126edc5f9d544d4ffbc092e10037be440cf4b62a6871591dbe3151fd5d9f38c1ec72bfc0ae23c84d8f502f528ebb63de737a1138e9

  • SSDEEP

    98304:hYvYJfLxtX3euZ4/853/4v4tQYgHl4rbTZvTRHYUaxNpbopTjYvH:WY5LxtE/bvOgHUTRBaPpKv

Malware Config

Targets

    • Target

      2d7d74c8204fe26ebd41564b92a80b80N

    • Size

      6.4MB

    • MD5

      2d7d74c8204fe26ebd41564b92a80b80

    • SHA1

      9425f442d8f6d7b0833609862df97b72296e4dde

    • SHA256

      1cbef57927e013839abbd5a6e996b5f331ade9268c2962a411c77f60f321b144

    • SHA512

      b3a20058bc2ac12b493db5126edc5f9d544d4ffbc092e10037be440cf4b62a6871591dbe3151fd5d9f38c1ec72bfc0ae23c84d8f502f528ebb63de737a1138e9

    • SSDEEP

      98304:hYvYJfLxtX3euZ4/853/4v4tQYgHl4rbTZvTRHYUaxNpbopTjYvH:WY5LxtE/bvOgHUTRBaPpKv

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks