General

  • Target

    fae43452c24227f9acb314d82c4cb45a

  • Size

    15.6MB

  • Sample

    210624-xsy35r6ezs

  • MD5

    fae43452c24227f9acb314d82c4cb45a

  • SHA1

    7465d5fdf59f0a0a9ec2d21aae6647e4c703f983

  • SHA256

    9ba5de063e64a823aaaa28caf5948e018555fad03a1ff1c0a2a8fba9470fbbd1

  • SHA512

    b163aaa286b7817a942ae308351e01532c573803a7c41d3fd31707a8bb9fac2d4d5ecc12186689af8ecb3e9d9802b24cf271da537fe75420586fa8306fb3b6a2

Malware Config

Targets

    • Target

      fae43452c24227f9acb314d82c4cb45a

    • Size

      15.6MB

    • MD5

      fae43452c24227f9acb314d82c4cb45a

    • SHA1

      7465d5fdf59f0a0a9ec2d21aae6647e4c703f983

    • SHA256

      9ba5de063e64a823aaaa28caf5948e018555fad03a1ff1c0a2a8fba9470fbbd1

    • SHA512

      b163aaa286b7817a942ae308351e01532c573803a7c41d3fd31707a8bb9fac2d4d5ecc12186689af8ecb3e9d9802b24cf271da537fe75420586fa8306fb3b6a2

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Account Manipulation

1
T1098

Hidden Files and Directories

1
T1158

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Tasks