General

  • Target

    243c4ccbb2d39e84b2362e380abff678723e7fdd958bd5adddaf3fdd5a458034

  • Size

    5.9MB

  • Sample

    250328-slwa1axxe1

  • MD5

    c0a31935bc5d7ac67b8e09ff045f3d6b

  • SHA1

    30d23da7d0e7edb61cb9f1acc912c67586d4e52c

  • SHA256

    243c4ccbb2d39e84b2362e380abff678723e7fdd958bd5adddaf3fdd5a458034

  • SHA512

    fe65c3862c95b46dc975fd74d88429b680ca350c199014528587901a0efa172d48ac96627c53d7e55107bbb1e5d7ef5ff3c98a949cb3c993cdf11ddea3cf55bb

  • SSDEEP

    98304:2ILNTiGmEf2h6d5LSVE3mWvqdiabu8qohOA8bElxj5b8//kY0xTQWjB:dRlXLS2xicDQOAlx1o/d0RQkB

Malware Config

Targets

    • Target

      243c4ccbb2d39e84b2362e380abff678723e7fdd958bd5adddaf3fdd5a458034

    • Size

      5.9MB

    • MD5

      c0a31935bc5d7ac67b8e09ff045f3d6b

    • SHA1

      30d23da7d0e7edb61cb9f1acc912c67586d4e52c

    • SHA256

      243c4ccbb2d39e84b2362e380abff678723e7fdd958bd5adddaf3fdd5a458034

    • SHA512

      fe65c3862c95b46dc975fd74d88429b680ca350c199014528587901a0efa172d48ac96627c53d7e55107bbb1e5d7ef5ff3c98a949cb3c993cdf11ddea3cf55bb

    • SSDEEP

      98304:2ILNTiGmEf2h6d5LSVE3mWvqdiabu8qohOA8bElxj5b8//kY0xTQWjB:dRlXLS2xicDQOAlx1o/d0RQkB

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks