General

  • Target

    b8709757baea0b118117bb67dc4aeebdf0aa3f754adcb403457cd9bb542f1d58

  • Size

    7.9MB

  • Sample

    241119-qfkafa1mgr

  • MD5

    110fd710e91c63686564a5b59978b7cc

  • SHA1

    3b3dba2e64344a3b63820af7ec445828f6330fde

  • SHA256

    b8709757baea0b118117bb67dc4aeebdf0aa3f754adcb403457cd9bb542f1d58

  • SHA512

    d1af891b92af59d9abffc79215a2f40f185887710f01a1d6edf62f7e2bb805dbe5e4b52ecb0dbb6d67ebbd0ea9b4402b78d6cf033efaa51f42084776e7b1a3f9

  • SSDEEP

    98304:Kg49ZaYwsmJdj9PfPHXCjNTEY9xFUkcVwNSHfbv/kOIhThw6Q1f+hl/hjY4+iaf7:KgP94NTx9Pe20/zkOiu1f+79YR0k

Malware Config

Targets

    • Target

      b8709757baea0b118117bb67dc4aeebdf0aa3f754adcb403457cd9bb542f1d58

    • Size

      7.9MB

    • MD5

      110fd710e91c63686564a5b59978b7cc

    • SHA1

      3b3dba2e64344a3b63820af7ec445828f6330fde

    • SHA256

      b8709757baea0b118117bb67dc4aeebdf0aa3f754adcb403457cd9bb542f1d58

    • SHA512

      d1af891b92af59d9abffc79215a2f40f185887710f01a1d6edf62f7e2bb805dbe5e4b52ecb0dbb6d67ebbd0ea9b4402b78d6cf033efaa51f42084776e7b1a3f9

    • SSDEEP

      98304:Kg49ZaYwsmJdj9PfPHXCjNTEY9xFUkcVwNSHfbv/kOIhThw6Q1f+hl/hjY4+iaf7:KgP94NTx9Pe20/zkOiu1f+79YR0k

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks