General

  • Target

    7f5fcf6f4b3b575dad5d3d6c7f504c0d3377174c7a899412086e32dc7f85905f

  • Size

    746KB

  • Sample

    210511-vs1nvr3jps

  • MD5

    e391c23c26e087d7c4b787617b5a54ed

  • SHA1

    19862b345a3a84b54802fc6700e06b2bba7e7622

  • SHA256

    7f5fcf6f4b3b575dad5d3d6c7f504c0d3377174c7a899412086e32dc7f85905f

  • SHA512

    12bcb3fbc54400ff3d304335998fe98886b2f8901bb083f2e2033570158a49f963d056d50abdbff40b75723c251fe8b8eb34663f0d2c6a271ed04ef2bf2f162a

Malware Config

Targets

    • Target

      7f5fcf6f4b3b575dad5d3d6c7f504c0d3377174c7a899412086e32dc7f85905f

    • Size

      746KB

    • MD5

      e391c23c26e087d7c4b787617b5a54ed

    • SHA1

      19862b345a3a84b54802fc6700e06b2bba7e7622

    • SHA256

      7f5fcf6f4b3b575dad5d3d6c7f504c0d3377174c7a899412086e32dc7f85905f

    • SHA512

      12bcb3fbc54400ff3d304335998fe98886b2f8901bb083f2e2033570158a49f963d056d50abdbff40b75723c251fe8b8eb34663f0d2c6a271ed04ef2bf2f162a

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Hidden Files and Directories

1
T1158

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks