Resubmissions

21-11-2024 15:38

241121-s27c7sxpel 10

General

  • Target

    sample

  • Size

    19KB

  • Sample

    241121-s27c7sxpel

  • MD5

    6eab4260e9c869dbfe49a69d940f60fe

  • SHA1

    3c6d4fd3ec1f3b4b9dd47a5cf8c54961f1e51156

  • SHA256

    738f59dece9607a9ccc4dd300ff39696d2999163a97250b2aceaea98072298d9

  • SHA512

    ba0422b27f965818bd1ec4938fc92e934965832eba5c2cb87ac9eb9e44fc7d2acd5868b829cb77f69d984fec33c9490f22adfefdfe43a41dca83f9070b1065a9

  • SSDEEP

    384:rilUD1ocy4R4lbGaIDOvhpNyN+eKgRlObz6r0sZIL2fx1xCejiw:rilUD1ocy46EaiOJpN2+lbz6r0sZILUv

Malware Config

Targets

    • Target

      sample

    • Size

      19KB

    • MD5

      6eab4260e9c869dbfe49a69d940f60fe

    • SHA1

      3c6d4fd3ec1f3b4b9dd47a5cf8c54961f1e51156

    • SHA256

      738f59dece9607a9ccc4dd300ff39696d2999163a97250b2aceaea98072298d9

    • SHA512

      ba0422b27f965818bd1ec4938fc92e934965832eba5c2cb87ac9eb9e44fc7d2acd5868b829cb77f69d984fec33c9490f22adfefdfe43a41dca83f9070b1065a9

    • SSDEEP

      384:rilUD1ocy4R4lbGaIDOvhpNyN+eKgRlObz6r0sZIL2fx1xCejiw:rilUD1ocy46EaiOJpN2+lbz6r0sZILUv

    • Modifies security service

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: [email protected]

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks