General

  • Target

    Archive.zip

  • Size

    25.6MB

  • Sample

    241121-p91c3swrfl

  • MD5

    a418335626174c29cbf6d5a519362106

  • SHA1

    4ac2cc02a9b8c157d12439c823dfaf5e9a9cbd7a

  • SHA256

    545c065991ae5dbc7e2372e16aebbb5f160766b4dd0099eb70130d04878a8ce1

  • SHA512

    7041a765b7f5a57c0285ae548d9cf91c16c688af871c56707936343321d75535cc12ab2d7ef9d32bcbf0f563d6f11ea5b7df0e9be8c030300d5a17c7af2910bf

  • SSDEEP

    393216:rPxrEbkoFh/RV+q0873ODCjSDKfboqnVH2c+Ix+cAGT6MJs7EPwbr9nm2q3/AbI:NrqfpVcwODmSDIbldNx+LGsLb02qPAk

Malware Config

Targets

    • Target

      Archive.zip

    • Size

      25.6MB

    • MD5

      a418335626174c29cbf6d5a519362106

    • SHA1

      4ac2cc02a9b8c157d12439c823dfaf5e9a9cbd7a

    • SHA256

      545c065991ae5dbc7e2372e16aebbb5f160766b4dd0099eb70130d04878a8ce1

    • SHA512

      7041a765b7f5a57c0285ae548d9cf91c16c688af871c56707936343321d75535cc12ab2d7ef9d32bcbf0f563d6f11ea5b7df0e9be8c030300d5a17c7af2910bf

    • SSDEEP

      393216:rPxrEbkoFh/RV+q0873ODCjSDKfboqnVH2c+Ix+cAGT6MJs7EPwbr9nm2q3/AbI:NrqfpVcwODmSDIbldNx+LGsLb02qPAk

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks