General

  • Target

    start.bat

  • Size

    3.6MB

  • Sample

    211021-2r9j9aahc7

  • MD5

    032687d100b775f3693d581156e20456

  • SHA1

    41deda7622b2300396f3d236c29df5f696bb4503

  • SHA256

    a674a4a32f849cc121e6b872da5a793418de56a458e530b351a801ba6d6300f7

  • SHA512

    b1222c235d062dcd108d65acba6b05f5aae768530de86aca2077dd7785b07cf57d48df8207675a3280f9b8e2c4c7bc4d288f927dc6d8d06b4c9d2afbc6304f83

Malware Config

Targets

    • Target

      start.bat

    • Size

      3.6MB

    • MD5

      032687d100b775f3693d581156e20456

    • SHA1

      41deda7622b2300396f3d236c29df5f696bb4503

    • SHA256

      a674a4a32f849cc121e6b872da5a793418de56a458e530b351a801ba6d6300f7

    • SHA512

      b1222c235d062dcd108d65acba6b05f5aae768530de86aca2077dd7785b07cf57d48df8207675a3280f9b8e2c4c7bc4d288f927dc6d8d06b4c9d2afbc6304f83

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

1
T1089

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks