General

  • Target

    de9337ae9e8d537dbe56bfbd7dfa7652ad4aa7a99ba4ff1ffe8e1dcc522b7a62

  • Size

    2.4MB

  • Sample

    241009-axzhpatgnl

  • MD5

    2b4af996b70c194b62c7937c28e8442e

  • SHA1

    1eb598ef0acec5c0e90561770415ddac4acfa6a1

  • SHA256

    de9337ae9e8d537dbe56bfbd7dfa7652ad4aa7a99ba4ff1ffe8e1dcc522b7a62

  • SHA512

    72ddb3b4ac269696a5859edbb25f39bf04cedbda700534595963b650dbcd4d17d3c9cbb8956365dff0ba3143db78f444d6c7b6a4b9d4187e7adb9040c59e2dfa

  • SSDEEP

    49152:oq+0i+Fnf2xRlAgrOuwSc3v06pIqMe1tfiaiI6LE341pCrL/3dgsh14/d3Jf:chwSIpbMe1xix/LE3sCrLvdgg14/d3J

Malware Config

Targets

    • Target

      de9337ae9e8d537dbe56bfbd7dfa7652ad4aa7a99ba4ff1ffe8e1dcc522b7a62

    • Size

      2.4MB

    • MD5

      2b4af996b70c194b62c7937c28e8442e

    • SHA1

      1eb598ef0acec5c0e90561770415ddac4acfa6a1

    • SHA256

      de9337ae9e8d537dbe56bfbd7dfa7652ad4aa7a99ba4ff1ffe8e1dcc522b7a62

    • SHA512

      72ddb3b4ac269696a5859edbb25f39bf04cedbda700534595963b650dbcd4d17d3c9cbb8956365dff0ba3143db78f444d6c7b6a4b9d4187e7adb9040c59e2dfa

    • SSDEEP

      49152:oq+0i+Fnf2xRlAgrOuwSc3v06pIqMe1tfiaiI6LE341pCrL/3dgsh14/d3Jf:chwSIpbMe1xix/LE3sCrLvdgg14/d3J

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks