General

  • Target

    42af7afa3e4fdb77b23e43f2019e8203e146ce08482e705c027d4456122f22fc

  • Size

    914KB

  • Sample

    220919-z5rkgsdddj

  • MD5

    e9f336c6f932a1621f283e9c998e7495

  • SHA1

    14e1d1a7ebac436749af2b4738d92e2ac375c09d

  • SHA256

    42af7afa3e4fdb77b23e43f2019e8203e146ce08482e705c027d4456122f22fc

  • SHA512

    4b7e06485c34a8433462a38fc3c605ae82542614de8cc461772d2700409b1c9bfc2f839fd1cb2ea17e589fe6f1c37a197f4781214c285962e712ea059e88f6a0

  • SSDEEP

    1536:+EfFNvtgmAl7z5dKY6yuJPW8K43w9NXOM1aRl/i6JWT0S9yXnBibnouy8gHn2JX:+YLmGO4W849NXO9RlK6gOxiDouto2N

Malware Config

Targets

    • Target

      42af7afa3e4fdb77b23e43f2019e8203e146ce08482e705c027d4456122f22fc

    • Size

      914KB

    • MD5

      e9f336c6f932a1621f283e9c998e7495

    • SHA1

      14e1d1a7ebac436749af2b4738d92e2ac375c09d

    • SHA256

      42af7afa3e4fdb77b23e43f2019e8203e146ce08482e705c027d4456122f22fc

    • SHA512

      4b7e06485c34a8433462a38fc3c605ae82542614de8cc461772d2700409b1c9bfc2f839fd1cb2ea17e589fe6f1c37a197f4781214c285962e712ea059e88f6a0

    • SSDEEP

      1536:+EfFNvtgmAl7z5dKY6yuJPW8K43w9NXOM1aRl/i6JWT0S9yXnBibnouy8gHn2JX:+YLmGO4W849NXO9RlK6gOxiDouto2N

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks