General

  • Target

    304a2a17f482efca5e8a9e59b7e17f0f7cbd3bce77680f72ef079a81eadab70c

  • Size

    321KB

  • Sample

    220520-2p86psfgd8

  • MD5

    6f6df11c0814860cc5a4fe7a9db87cc9

  • SHA1

    539bbcc5ec63af4255a65e20ffb1352338cf41d2

  • SHA256

    304a2a17f482efca5e8a9e59b7e17f0f7cbd3bce77680f72ef079a81eadab70c

  • SHA512

    82bf7779e05bd6a734e51747f8fa8f879853c9869f88ecc0f7bf6bf13aeacdd47e7c506b9dde688c955c1f688f2889f8a8c92d263fcb411ec8663a43fe6ce31c

Malware Config

Targets

    • Target

      304a2a17f482efca5e8a9e59b7e17f0f7cbd3bce77680f72ef079a81eadab70c

    • Size

      321KB

    • MD5

      6f6df11c0814860cc5a4fe7a9db87cc9

    • SHA1

      539bbcc5ec63af4255a65e20ffb1352338cf41d2

    • SHA256

      304a2a17f482efca5e8a9e59b7e17f0f7cbd3bce77680f72ef079a81eadab70c

    • SHA512

      82bf7779e05bd6a734e51747f8fa8f879853c9869f88ecc0f7bf6bf13aeacdd47e7c506b9dde688c955c1f688f2889f8a8c92d263fcb411ec8663a43fe6ce31c

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • sakari

      Sakari is a stealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

2
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

2
T1089

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks