General

  • Target

    28919afee9847d367417276c3204a85300fb66649e4afcf3de3a83e692ab5cd1N

  • Size

    9.8MB

  • Sample

    241009-1btcnavbmj

  • MD5

    69423c59bdb418badd7533b67ca7bef0

  • SHA1

    cee771d6e976b5fa2911342c6de64d21c8a05265

  • SHA256

    28919afee9847d367417276c3204a85300fb66649e4afcf3de3a83e692ab5cd1

  • SHA512

    ee6f46017a21a0e4c11036fbcbeac4a375ed2e30ca55bc0fe09285bb9d189537eb644302598d50ff06b472aff0cd5a742ff18dd82a15d82b690dae812be1fdb7

  • SSDEEP

    196608:rw4SSJ7PbDdh0HtQba8z1sjzkAilU4I4:rw45J7PbDjOQba8psjzyz

Malware Config

Targets

    • Target

      28919afee9847d367417276c3204a85300fb66649e4afcf3de3a83e692ab5cd1N

    • Size

      9.8MB

    • MD5

      69423c59bdb418badd7533b67ca7bef0

    • SHA1

      cee771d6e976b5fa2911342c6de64d21c8a05265

    • SHA256

      28919afee9847d367417276c3204a85300fb66649e4afcf3de3a83e692ab5cd1

    • SHA512

      ee6f46017a21a0e4c11036fbcbeac4a375ed2e30ca55bc0fe09285bb9d189537eb644302598d50ff06b472aff0cd5a742ff18dd82a15d82b690dae812be1fdb7

    • SSDEEP

      196608:rw4SSJ7PbDdh0HtQba8z1sjzkAilU4I4:rw45J7PbDjOQba8psjzyz

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks