General

  • Target

    RFQ.scr.exe

  • Size

    1.1MB

  • Sample

    241121-n54n9ssjfs

  • MD5

    f30993e7984ac60c08d69710eaae6ef4

  • SHA1

    5caad7257cb88084ac77915bc6247450fdd7faf1

  • SHA256

    c8d717bc9d9c2bd335a79ac5e189d98f36fcd7ab0c62475a7aa7da5fd5ae75d1

  • SHA512

    c2a9353e6cf3ceb641dc4d4f68917d9d55a23cb8ca1cbc9f6c9ba9492cfb8fc7a8cbcc9a389ad877244afc15fec03204cd747b9a3e073b70a24776143a25bd74

  • SSDEEP

    24576:HEMpzxW67lClGVT2tpH3tJBmqzzz2LA5BEHgeCr0Mn0P6:jWAl/2ndJbzL/EHgtr4C

Malware Config

Targets

    • Target

      RFQ.scr.exe

    • Size

      1.1MB

    • MD5

      f30993e7984ac60c08d69710eaae6ef4

    • SHA1

      5caad7257cb88084ac77915bc6247450fdd7faf1

    • SHA256

      c8d717bc9d9c2bd335a79ac5e189d98f36fcd7ab0c62475a7aa7da5fd5ae75d1

    • SHA512

      c2a9353e6cf3ceb641dc4d4f68917d9d55a23cb8ca1cbc9f6c9ba9492cfb8fc7a8cbcc9a389ad877244afc15fec03204cd747b9a3e073b70a24776143a25bd74

    • SSDEEP

      24576:HEMpzxW67lClGVT2tpH3tJBmqzzz2LA5BEHgeCr0Mn0P6:jWAl/2ndJbzL/EHgtr4C

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks