General

  • Target

    f9e710f81111aae5eb699f39a09c8b4fa02815335f0707c85bf13012d8daa0e7

  • Size

    5.9MB

  • Sample

    250328-rldwaaxsby

  • MD5

    5dfc1d13a567b959767dc96b0b47daa6

  • SHA1

    855d1463bee7b1bc017dccd65ef976478e3ab994

  • SHA256

    f9e710f81111aae5eb699f39a09c8b4fa02815335f0707c85bf13012d8daa0e7

  • SHA512

    cf9ce83e6a52e48a938afee65fe0c81ec9cd43dcbe85aa88b0dd3e427b0defd69af04557a70685ae69621b92cc30826534937cc23dd40d077a2842ac037d4d1e

  • SSDEEP

    98304:6ILNTiGmEf2h6d5LSVE3mWvqdiabu8qohOA8bElxj5b8/vkZ0xTQWjq:ZRlXLS2xicDQOAlx1ovk0RQkq

Malware Config

Targets

    • Target

      f9e710f81111aae5eb699f39a09c8b4fa02815335f0707c85bf13012d8daa0e7

    • Size

      5.9MB

    • MD5

      5dfc1d13a567b959767dc96b0b47daa6

    • SHA1

      855d1463bee7b1bc017dccd65ef976478e3ab994

    • SHA256

      f9e710f81111aae5eb699f39a09c8b4fa02815335f0707c85bf13012d8daa0e7

    • SHA512

      cf9ce83e6a52e48a938afee65fe0c81ec9cd43dcbe85aa88b0dd3e427b0defd69af04557a70685ae69621b92cc30826534937cc23dd40d077a2842ac037d4d1e

    • SSDEEP

      98304:6ILNTiGmEf2h6d5LSVE3mWvqdiabu8qohOA8bElxj5b8/vkZ0xTQWjq:ZRlXLS2xicDQOAlx1ovk0RQkq

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks