General

  • Target

    52fa119750136bb728653993890fa73eff227769b42e861656977777a5bada98

  • Size

    966KB

  • Sample

    220919-dp5aradgg8

  • MD5

    6771ab57f16fb119e7faad8b5ded4bdc

  • SHA1

    12fdb11ef12990764acb5c7a2c21d7ec0f26092b

  • SHA256

    52fa119750136bb728653993890fa73eff227769b42e861656977777a5bada98

  • SHA512

    b188d3abd664ad83021707b7ba8c752dd475137c9a491ed0c28180229c9fb09666b56c2a8c44ad348c55b50a6dd0d80a07e673f13eaf6973964959a5b848c308

  • SSDEEP

    3072:CNnqDxIGX/9nDiG7t6yCAti1zxGJidD5iYAHg4Cs7lJgxwL0out:CNnxKL0oS

Malware Config

Targets

    • Target

      52fa119750136bb728653993890fa73eff227769b42e861656977777a5bada98

    • Size

      966KB

    • MD5

      6771ab57f16fb119e7faad8b5ded4bdc

    • SHA1

      12fdb11ef12990764acb5c7a2c21d7ec0f26092b

    • SHA256

      52fa119750136bb728653993890fa73eff227769b42e861656977777a5bada98

    • SHA512

      b188d3abd664ad83021707b7ba8c752dd475137c9a491ed0c28180229c9fb09666b56c2a8c44ad348c55b50a6dd0d80a07e673f13eaf6973964959a5b848c308

    • SSDEEP

      3072:CNnqDxIGX/9nDiG7t6yCAti1zxGJidD5iYAHg4Cs7lJgxwL0out:CNnxKL0oS

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks