General

  • Target

    d2873dad634eafe9d2f76742d3608d54db705b065642bc1a6cfa1b1d6adc5495

  • Size

    9.8MB

  • Sample

    241010-qblygaxaja

  • MD5

    7226f7f7c56907b55e0dbc538f8e27f7

  • SHA1

    7c47caa1a6ccc0628fd46507bf32877f05168614

  • SHA256

    d2873dad634eafe9d2f76742d3608d54db705b065642bc1a6cfa1b1d6adc5495

  • SHA512

    48649a636628999812631d28867b803852648794de416eaec80b0b374050c8ec312ac2d0b906782237cfc43ecb7723e84f5c4f5c397fc677be2fadf632850ca9

  • SSDEEP

    196608:rw4SSJ7PbDdh0HtQba8z1sjzkAilU4I4:rw45J7PbDjOQba8psjzyz

Malware Config

Targets

    • Target

      d2873dad634eafe9d2f76742d3608d54db705b065642bc1a6cfa1b1d6adc5495

    • Size

      9.8MB

    • MD5

      7226f7f7c56907b55e0dbc538f8e27f7

    • SHA1

      7c47caa1a6ccc0628fd46507bf32877f05168614

    • SHA256

      d2873dad634eafe9d2f76742d3608d54db705b065642bc1a6cfa1b1d6adc5495

    • SHA512

      48649a636628999812631d28867b803852648794de416eaec80b0b374050c8ec312ac2d0b906782237cfc43ecb7723e84f5c4f5c397fc677be2fadf632850ca9

    • SSDEEP

      196608:rw4SSJ7PbDdh0HtQba8z1sjzkAilU4I4:rw45J7PbDjOQba8psjzyz

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks