General

  • Target

    51ccc6571faee5dd54ec94513fa62112b148c03ccde099d66909325397a02aa0

  • Size

    421KB

  • Sample

    220919-zaf59sbhej

  • MD5

    e17a3063b5082b6fc7eb85710060fede

  • SHA1

    3361f323eee7bd9b115c9ef795823f3bbebaec0d

  • SHA256

    51ccc6571faee5dd54ec94513fa62112b148c03ccde099d66909325397a02aa0

  • SHA512

    08d1cbbec18789ec9e11bc7d835fcda19b1be03f2a346b4fb48205348e21554d02c21caff5b66f4718e2683889317d485ab4e75a88f187a2f32e03c461b223d6

  • SSDEEP

    1536:7Eo6GzI9cono/es2KyvLh423iZB7LbGnkBwUDXLY+cnCd4SztNXjU8UdatVgc1h:g8ciono/e95vLh4j2Umns4khjU0jZ

Malware Config

Targets

    • Target

      51ccc6571faee5dd54ec94513fa62112b148c03ccde099d66909325397a02aa0

    • Size

      421KB

    • MD5

      e17a3063b5082b6fc7eb85710060fede

    • SHA1

      3361f323eee7bd9b115c9ef795823f3bbebaec0d

    • SHA256

      51ccc6571faee5dd54ec94513fa62112b148c03ccde099d66909325397a02aa0

    • SHA512

      08d1cbbec18789ec9e11bc7d835fcda19b1be03f2a346b4fb48205348e21554d02c21caff5b66f4718e2683889317d485ab4e75a88f187a2f32e03c461b223d6

    • SSDEEP

      1536:7Eo6GzI9cono/es2KyvLh423iZB7LbGnkBwUDXLY+cnCd4SztNXjU8UdatVgc1h:g8ciono/e95vLh4j2Umns4khjU0jZ

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks