Resubmissions

21/11/2024, 15:24

241121-ste9ratjcv 3

General

  • Target

    sample

  • Size

    18KB

  • Sample

    241120-tkahksyeqg

  • MD5

    f3ce74c76fa5209ff2b1fc3b7887bdbe

  • SHA1

    c14f848cac56d582284821df7fc1805a82354bab

  • SHA256

    075ebf8af29379b6082a52e846f50445c4bca42cea61bec40008d47739699fce

  • SHA512

    e449d55571ebe5f7337ef9df3c89fed3d4ce4d376f3fcf635d7a12a08b8533fada0f8f1d91dda2062e6cf7173b445dcecf39252642a059dafb72a43feafd8827

  • SSDEEP

    384:8X8DW1ocy4O4lbGabMvhpNLUvs3blObz6r0sZpfn1xCejiw:PDW1ocy4NEa4JpNAv/bz6r0sZR1xPiw

Malware Config

Targets

    • Target

      sample

    • Size

      18KB

    • MD5

      f3ce74c76fa5209ff2b1fc3b7887bdbe

    • SHA1

      c14f848cac56d582284821df7fc1805a82354bab

    • SHA256

      075ebf8af29379b6082a52e846f50445c4bca42cea61bec40008d47739699fce

    • SHA512

      e449d55571ebe5f7337ef9df3c89fed3d4ce4d376f3fcf635d7a12a08b8533fada0f8f1d91dda2062e6cf7173b445dcecf39252642a059dafb72a43feafd8827

    • SSDEEP

      384:8X8DW1ocy4O4lbGabMvhpNLUvs3blObz6r0sZpfn1xCejiw:PDW1ocy4NEa4JpNAv/bz6r0sZR1xPiw

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks