General

  • Target

    90255deee9292b4940ade8255f50993321c3df1a643794409b9a9a3e44257a29

  • Size

    446KB

  • Sample

    221011-nsj44acef2

  • MD5

    63040725dc8d3dca1755d21cc7c4c340

  • SHA1

    f9a8adfdef8c2554d598063b1a2848253cee0065

  • SHA256

    90255deee9292b4940ade8255f50993321c3df1a643794409b9a9a3e44257a29

  • SHA512

    e2ab3bf2e1278560328b29b0479d0c0f861c6badd252daf41815668804c9e9f579a8b0694ebaef5cdfa7d5db161a33315ca5a6c416b77a543c738e4bc4c79cf3

  • SSDEEP

    12288:/jpjS2ATtV7pWnmE+/+t3QmD0uXZwGci6RRmctzfgHGe3UJy6/Ptqq+:/l9ATtCmhSZODRDtzfgHGeB6/VV+

Malware Config

Targets

    • Target

      90255deee9292b4940ade8255f50993321c3df1a643794409b9a9a3e44257a29

    • Size

      446KB

    • MD5

      63040725dc8d3dca1755d21cc7c4c340

    • SHA1

      f9a8adfdef8c2554d598063b1a2848253cee0065

    • SHA256

      90255deee9292b4940ade8255f50993321c3df1a643794409b9a9a3e44257a29

    • SHA512

      e2ab3bf2e1278560328b29b0479d0c0f861c6badd252daf41815668804c9e9f579a8b0694ebaef5cdfa7d5db161a33315ca5a6c416b77a543c738e4bc4c79cf3

    • SSDEEP

      12288:/jpjS2ATtV7pWnmE+/+t3QmD0uXZwGci6RRmctzfgHGe3UJy6/Ptqq+:/l9ATtCmhSZODRDtzfgHGeB6/VV+

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks