General

  • Target

    45def37a33ac8c66332d64929636aa908916c5a4c4b17ff5724de5564d066105

  • Size

    563KB

  • Sample

    241117-mpx14ssmel

  • MD5

    ff74aaf66702698ab99a64686d6a3153

  • SHA1

    3be6d96926998b89a13a0aa8d6d33b3d3c2b354a

  • SHA256

    45def37a33ac8c66332d64929636aa908916c5a4c4b17ff5724de5564d066105

  • SHA512

    509af0bf60311965c287b3f5d91a3d95690c4a2b64b655f538a92d819a2f894e4c47067455db5d6385976cd97fa041c52d7fc50e9088a25c3b226eb7844f49f2

  • SSDEEP

    12288:qzfkaDPw1Qk89TmycCpwdWBsBAn8Qcu7o/n1ShJrxuRjvvFihs17/P1kR:qBLw9gTFcswdEsqn8Y7qngJluJA4w

Malware Config

Targets

    • Target

      45def37a33ac8c66332d64929636aa908916c5a4c4b17ff5724de5564d066105

    • Size

      563KB

    • MD5

      ff74aaf66702698ab99a64686d6a3153

    • SHA1

      3be6d96926998b89a13a0aa8d6d33b3d3c2b354a

    • SHA256

      45def37a33ac8c66332d64929636aa908916c5a4c4b17ff5724de5564d066105

    • SHA512

      509af0bf60311965c287b3f5d91a3d95690c4a2b64b655f538a92d819a2f894e4c47067455db5d6385976cd97fa041c52d7fc50e9088a25c3b226eb7844f49f2

    • SSDEEP

      12288:qzfkaDPw1Qk89TmycCpwdWBsBAn8Qcu7o/n1ShJrxuRjvvFihs17/P1kR:qBLw9gTFcswdEsqn8Y7qngJluJA4w

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks