General

  • Target

    ce64bc3b2013abf97500d88797388a1053900eeaedef97781d75cd68f6f431bc

  • Size

    831KB

  • Sample

    221002-yatwpahden

  • MD5

    6672b3081becd9465f9ffbab7e9266f0

  • SHA1

    43db494e86fd02734ecf8495f04e482cc9b2f0d9

  • SHA256

    ce64bc3b2013abf97500d88797388a1053900eeaedef97781d75cd68f6f431bc

  • SHA512

    b179317b3b3667f8dc8fdea1094492fd75e91a493de0994f6e19cc3ccf9ace5b0647a22e4b97d3956efca9a0b81db286132708132a022ff477def550b1cddaaf

  • SSDEEP

    24576:jHbxccPdGYHyNq29aTpmeJnRhCyB7CfaMIu4s:jJPwI29ve1/HWZIub

Malware Config

Targets

    • Target

      ce64bc3b2013abf97500d88797388a1053900eeaedef97781d75cd68f6f431bc

    • Size

      831KB

    • MD5

      6672b3081becd9465f9ffbab7e9266f0

    • SHA1

      43db494e86fd02734ecf8495f04e482cc9b2f0d9

    • SHA256

      ce64bc3b2013abf97500d88797388a1053900eeaedef97781d75cd68f6f431bc

    • SHA512

      b179317b3b3667f8dc8fdea1094492fd75e91a493de0994f6e19cc3ccf9ace5b0647a22e4b97d3956efca9a0b81db286132708132a022ff477def550b1cddaaf

    • SSDEEP

      24576:jHbxccPdGYHyNq29aTpmeJnRhCyB7CfaMIu4s:jJPwI29ve1/HWZIub

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks