General

  • Target

    file.exe

  • Size

    7.2MB

  • Sample

    220927-2zjnssega9

  • MD5

    5eb69c0ca6e332148116ae0ee983244f

  • SHA1

    02db54940d2d2d8a45ee1c4a3c796784abc48c5b

  • SHA256

    fd5c05ba8b0b3565d2dc29f8f849bcaca1b7b8880a965b4a9f314b8b100d98dc

  • SHA512

    bcb4605f29468d635a80bb25bbee54e330aa2eb274d36586987f467507bc06af449e6a54dc55730950dc72d4f7e7a5786813f412d540b72307745c9d99a6b1cc

  • SSDEEP

    196608:91O6XhxFlmDesemftcv9eih+fCiUdKGsBIm0niiJbZ+nq:3OqhBoFMtziUoGIIm8iimq

Malware Config

Targets

    • Target

      file.exe

    • Size

      7.2MB

    • MD5

      5eb69c0ca6e332148116ae0ee983244f

    • SHA1

      02db54940d2d2d8a45ee1c4a3c796784abc48c5b

    • SHA256

      fd5c05ba8b0b3565d2dc29f8f849bcaca1b7b8880a965b4a9f314b8b100d98dc

    • SHA512

      bcb4605f29468d635a80bb25bbee54e330aa2eb274d36586987f467507bc06af449e6a54dc55730950dc72d4f7e7a5786813f412d540b72307745c9d99a6b1cc

    • SSDEEP

      196608:91O6XhxFlmDesemftcv9eih+fCiUdKGsBIm0niiJbZ+nq:3OqhBoFMtziUoGIIm8iimq

    • Modifies Windows Defender Real-time Protection settings

    • Windows security bypass

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks