Resubmissions

26-09-2024 15:31

240926-syeh1svbrk 10

26-09-2024 15:28

240926-swd5gaxemh 10

General

  • Target

    GSB.exe

  • Size

    17.8MB

  • Sample

    240926-syeh1svbrk

  • MD5

    b6a32e9bed61d137f4da4631fa2bf28b

  • SHA1

    2bcae476a5075a3c2f3c8784fbb9b7423d47ef20

  • SHA256

    20951c64e76fe47ba0eb9b14428cc12f41914d671127079446b79bc142d1b782

  • SHA512

    fb71311eb4b019fd397313d42e834086b783dae6d2d3b8902bd2bb50c1ffd7f30527ac2e31af7619d688670e78864c1fba701dc943db0302c4bcfd6616562777

  • SSDEEP

    393216:mqPnLFXlreQ+DOETgsvfG6gSsvE0c/5i7veq:LPLFXNeQ/EnPFr54

Malware Config

Targets

    • Target

      GSB.exe

    • Size

      17.8MB

    • MD5

      b6a32e9bed61d137f4da4631fa2bf28b

    • SHA1

      2bcae476a5075a3c2f3c8784fbb9b7423d47ef20

    • SHA256

      20951c64e76fe47ba0eb9b14428cc12f41914d671127079446b79bc142d1b782

    • SHA512

      fb71311eb4b019fd397313d42e834086b783dae6d2d3b8902bd2bb50c1ffd7f30527ac2e31af7619d688670e78864c1fba701dc943db0302c4bcfd6616562777

    • SSDEEP

      393216:mqPnLFXlreQ+DOETgsvfG6gSsvE0c/5i7veq:LPLFXNeQ/EnPFr54

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks