General

  • Target

    1db01814dc21b53ae06ca898dca3a7fa0d9d45c87203774c6b5dc996202d0049

  • Size

    4.8MB

  • Sample

    240921-17qawaxbqm

  • MD5

    2b82218e581b59bdd7b479ed8b6468a5

  • SHA1

    b70a3594dbbea5db7c041571ae41051ddfc5f905

  • SHA256

    1db01814dc21b53ae06ca898dca3a7fa0d9d45c87203774c6b5dc996202d0049

  • SHA512

    ffce3b87ba617fd22bfbea1b51237e253f1c0422ff57da1d2caddb5cde9c2c5246009b4c2f9d35e3936826e988265a05919305020f3944ed3046ff13a98fb511

  • SSDEEP

    98304:Yrbc0dxOfbCIYflBduQn8LjGQrOsnVLMwbnR+:YrbcQWb8flBdm26pnVLlnY

Malware Config

Targets

    • Target

      1db01814dc21b53ae06ca898dca3a7fa0d9d45c87203774c6b5dc996202d0049

    • Size

      4.8MB

    • MD5

      2b82218e581b59bdd7b479ed8b6468a5

    • SHA1

      b70a3594dbbea5db7c041571ae41051ddfc5f905

    • SHA256

      1db01814dc21b53ae06ca898dca3a7fa0d9d45c87203774c6b5dc996202d0049

    • SHA512

      ffce3b87ba617fd22bfbea1b51237e253f1c0422ff57da1d2caddb5cde9c2c5246009b4c2f9d35e3936826e988265a05919305020f3944ed3046ff13a98fb511

    • SSDEEP

      98304:Yrbc0dxOfbCIYflBduQn8LjGQrOsnVLMwbnR+:YrbcQWb8flBdm26pnVLlnY

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks