General

  • Target

    file.exe

  • Size

    7.3MB

  • Sample

    221004-cfjr1sgdfr

  • MD5

    f49e4d425a3c5f64535f022d3aec51c9

  • SHA1

    7a4e965c8cf5ec794ecdfddb433b6a9c3c4efbb4

  • SHA256

    305c76854134bc11e6851fec9854bdec38940be4bcda4de60391054fa3ca3070

  • SHA512

    b94656b3e2f9534f66a61aaa8fdc62f07cf8a46bf827940cb58b806a8cdfe921a88f96f2cfbbcebe98f2010c9ff8bc16891cd6bb6ebd360961a732efdb1874e7

  • SSDEEP

    196608:91OWn/bQ4cKnYlLPXKCoVmLxMqq8IoG2VTj8z+jbU:3OWnTQuYxPXK76MD87nn8yjg

Malware Config

Targets

    • Target

      file.exe

    • Size

      7.3MB

    • MD5

      f49e4d425a3c5f64535f022d3aec51c9

    • SHA1

      7a4e965c8cf5ec794ecdfddb433b6a9c3c4efbb4

    • SHA256

      305c76854134bc11e6851fec9854bdec38940be4bcda4de60391054fa3ca3070

    • SHA512

      b94656b3e2f9534f66a61aaa8fdc62f07cf8a46bf827940cb58b806a8cdfe921a88f96f2cfbbcebe98f2010c9ff8bc16891cd6bb6ebd360961a732efdb1874e7

    • SSDEEP

      196608:91OWn/bQ4cKnYlLPXKCoVmLxMqq8IoG2VTj8z+jbU:3OWnTQuYxPXK76MD87nn8yjg

    • Modifies Windows Defender Real-time Protection settings

    • Windows security bypass

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks