General

  • Target

    ddecf455e6cfd04276814dba2e6f642eca80c0f09a912b97f483233b81a4afa8

  • Size

    149KB

  • Sample

    241105-nakmxasncn

  • MD5

    847291ec10f4c2ec9704e647f3985384

  • SHA1

    b304c676cc362fef6229e4e4fd4f40ab64552209

  • SHA256

    ddecf455e6cfd04276814dba2e6f642eca80c0f09a912b97f483233b81a4afa8

  • SHA512

    105ae68d92fb055a6fd88f2d95c73afffeec3f603996678cf7da1c62c01b2bc2e3a57ab1602049d3844207d20d688380835665e95ec103a6c7ccaa3914014a7d

  • SSDEEP

    3072:N6glyuxE4GsUPnliByocWepFAkrUmcmWDVGRJ9Y:N6gDBGpvEByocWe7AuUmcm2VGz+

Malware Config

Targets

    • Target

      ddecf455e6cfd04276814dba2e6f642eca80c0f09a912b97f483233b81a4afa8

    • Size

      149KB

    • MD5

      847291ec10f4c2ec9704e647f3985384

    • SHA1

      b304c676cc362fef6229e4e4fd4f40ab64552209

    • SHA256

      ddecf455e6cfd04276814dba2e6f642eca80c0f09a912b97f483233b81a4afa8

    • SHA512

      105ae68d92fb055a6fd88f2d95c73afffeec3f603996678cf7da1c62c01b2bc2e3a57ab1602049d3844207d20d688380835665e95ec103a6c7ccaa3914014a7d

    • SSDEEP

      3072:N6glyuxE4GsUPnliByocWepFAkrUmcmWDVGRJ9Y:N6gDBGpvEByocWe7AuUmcm2VGz+

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks