Resubmissions

21-11-2024 02:56

241121-dfcjdaxfnb 8

21-11-2024 02:55

241121-destzaxfme 1

21-11-2024 02:39

241121-c5hagsxenf 3

21-11-2024 02:38

241121-c42yhaxrfv 3

21-11-2024 02:35

241121-c3gwyasncl 3

21-11-2024 02:23

241121-cvcl9axqh1 3

21-11-2024 02:17

241121-cq22caxqgz 3

General

  • Target

    639a17eed5125ced4bd08a468204732fa2d37d42d3a47465d22f3afe45b7c7a1

  • Size

    3.9MB

  • Sample

    241121-dfcjdaxfnb

  • MD5

    d436a7f9e06e611bff0cb685039aa1ff

  • SHA1

    2396f1730ad30aa07475d8a2df1a688836513c58

  • SHA256

    639a17eed5125ced4bd08a468204732fa2d37d42d3a47465d22f3afe45b7c7a1

  • SHA512

    84afb7d1a0ae1997ad7b359aac7c4cbb2fb191b59734e66e27f13985beedd9afd083931380b38d854ed7f4d607f6a42dd5f9a0db8fa4936749d71bd06ba108c9

  • SSDEEP

    98304:hZanHcQyaMI3AsE+RL6jefCkW376vBpkJ:n48jdE+HjOCkk+vA

Malware Config

Targets

    • Target

      639a17eed5125ced4bd08a468204732fa2d37d42d3a47465d22f3afe45b7c7a1

    • Size

      3.9MB

    • MD5

      d436a7f9e06e611bff0cb685039aa1ff

    • SHA1

      2396f1730ad30aa07475d8a2df1a688836513c58

    • SHA256

      639a17eed5125ced4bd08a468204732fa2d37d42d3a47465d22f3afe45b7c7a1

    • SHA512

      84afb7d1a0ae1997ad7b359aac7c4cbb2fb191b59734e66e27f13985beedd9afd083931380b38d854ed7f4d607f6a42dd5f9a0db8fa4936749d71bd06ba108c9

    • SSDEEP

      98304:hZanHcQyaMI3AsE+RL6jefCkW376vBpkJ:n48jdE+HjOCkk+vA

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Detected potential entity reuse from brand MICROSOFT.

MITRE ATT&CK Enterprise v15

Tasks