General

  • Target

    7d613eccca3ab22d1103fdaba35484233b7d3734d3c6b21ad2a94b8aa7c61a9e

  • Size

    10.0MB

  • Sample

    241014-ak793atdmg

  • MD5

    099f85da5d7522189c6b69aa1ad5ccbf

  • SHA1

    dc1ba326618deb15d86c2f636dc9873fbd4e723b

  • SHA256

    7d613eccca3ab22d1103fdaba35484233b7d3734d3c6b21ad2a94b8aa7c61a9e

  • SHA512

    aa82f69cf7a6636c413ee32944acc837ee2b2982e294504ddb571bcee56a073318ed1e4b9d1d07a37e7bf197c5b1284ba4785b49a0f8b475b7e45899e7ba9b7a

  • SSDEEP

    196608:6etS0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:6etRrDjtLKkOa8ps6puAktIz

Malware Config

Targets

    • Target

      7d613eccca3ab22d1103fdaba35484233b7d3734d3c6b21ad2a94b8aa7c61a9e

    • Size

      10.0MB

    • MD5

      099f85da5d7522189c6b69aa1ad5ccbf

    • SHA1

      dc1ba326618deb15d86c2f636dc9873fbd4e723b

    • SHA256

      7d613eccca3ab22d1103fdaba35484233b7d3734d3c6b21ad2a94b8aa7c61a9e

    • SHA512

      aa82f69cf7a6636c413ee32944acc837ee2b2982e294504ddb571bcee56a073318ed1e4b9d1d07a37e7bf197c5b1284ba4785b49a0f8b475b7e45899e7ba9b7a

    • SSDEEP

      196608:6etS0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:6etRrDjtLKkOa8ps6puAktIz

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks