General

  • Target

    redirect

  • Size

    6KB

  • Sample

    250119-cy7xkaslgs

  • MD5

    cd2b0782169a3c92e2f48c05535a8de4

  • SHA1

    27029c8a95f449a0477171f2789083853f9c462b

  • SHA256

    ef51be8fa647abaae636b11cad45df1f5a8207b8aece2f39a031a72b730fe149

  • SHA512

    958584561a4a2bdbd4d07bea1310aea61c3d109a67ad935784ff9bebd260d5c4eebe56185826730c26bedec8492d551e35ab09258a02f518b55faf41b70bdbbf

  • SSDEEP

    192:dMHLxX7777/77QF7JKyrq0Lod4BYCIka6OvXXEK:dMr5HYDG0+CIka6OvXXEK

Malware Config

Targets

    • Target

      redirect

    • Size

      6KB

    • MD5

      cd2b0782169a3c92e2f48c05535a8de4

    • SHA1

      27029c8a95f449a0477171f2789083853f9c462b

    • SHA256

      ef51be8fa647abaae636b11cad45df1f5a8207b8aece2f39a031a72b730fe149

    • SHA512

      958584561a4a2bdbd4d07bea1310aea61c3d109a67ad935784ff9bebd260d5c4eebe56185826730c26bedec8492d551e35ab09258a02f518b55faf41b70bdbbf

    • SSDEEP

      192:dMHLxX7777/77QF7JKyrq0Lod4BYCIka6OvXXEK:dMr5HYDG0+CIka6OvXXEK

    • Detected google phishing page

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: [email protected]

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks