General

  • Target

    ec7aacbac09f4d75e1dd32e547525b43dee88c86aa6540db668e8764c3c32bfd

  • Size

    132KB

  • Sample

    221003-vewdjaffcm

  • MD5

    4e6a260038f257005b65e2585a9db561

  • SHA1

    080d4f8f428f12db4efccf83ecd90c979c661db2

  • SHA256

    ec7aacbac09f4d75e1dd32e547525b43dee88c86aa6540db668e8764c3c32bfd

  • SHA512

    a392bf6c4243723dbe8400f4bfd82d3a7ed2f98cc13b86edda28a4aafaa07e52434ffc66ba3d4144418b7f8ed1c6d809fe4823827458a9412ce90600802a708b

  • SSDEEP

    3072:S6cpbetNSe92q0158JNlBGZZLe8ZTKemMoM+/UiO5f+qWQV:S6cBetke92q458h0xWJM+8XpOQV

Malware Config

Targets

    • Target

      ec7aacbac09f4d75e1dd32e547525b43dee88c86aa6540db668e8764c3c32bfd

    • Size

      132KB

    • MD5

      4e6a260038f257005b65e2585a9db561

    • SHA1

      080d4f8f428f12db4efccf83ecd90c979c661db2

    • SHA256

      ec7aacbac09f4d75e1dd32e547525b43dee88c86aa6540db668e8764c3c32bfd

    • SHA512

      a392bf6c4243723dbe8400f4bfd82d3a7ed2f98cc13b86edda28a4aafaa07e52434ffc66ba3d4144418b7f8ed1c6d809fe4823827458a9412ce90600802a708b

    • SSDEEP

      3072:S6cpbetNSe92q0158JNlBGZZLe8ZTKemMoM+/UiO5f+qWQV:S6cBetke92q458h0xWJM+8XpOQV

    • Modifies security service

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks