General

  • Target

    a0f120a893c68b006cc01020f0737eddae81a7e7d99945941593b97801a1e8cc

  • Size

    624KB

  • Sample

    210511-7h91xkdd2e

  • MD5

    c6774cb50ab7eeac8a7821e3d6b66b9a

  • SHA1

    5ebe724ab890aed89ef18fa4cecf32ebc66a25cc

  • SHA256

    a0f120a893c68b006cc01020f0737eddae81a7e7d99945941593b97801a1e8cc

  • SHA512

    6578afc12a030f171e6dfcd8933626745c91bdb31b557fb25d826416a8e9fe69a0de9b892f63c3ebaeca5553527d78af9f09f1caaff9872299d899e37ca6cbaf

Malware Config

Targets

    • Target

      a0f120a893c68b006cc01020f0737eddae81a7e7d99945941593b97801a1e8cc

    • Size

      624KB

    • MD5

      c6774cb50ab7eeac8a7821e3d6b66b9a

    • SHA1

      5ebe724ab890aed89ef18fa4cecf32ebc66a25cc

    • SHA256

      a0f120a893c68b006cc01020f0737eddae81a7e7d99945941593b97801a1e8cc

    • SHA512

      6578afc12a030f171e6dfcd8933626745c91bdb31b557fb25d826416a8e9fe69a0de9b892f63c3ebaeca5553527d78af9f09f1caaff9872299d899e37ca6cbaf

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Hidden Files and Directories

1
T1158

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks