General

  • Target

    5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286

  • Size

    447KB

  • Sample

    221011-ntb5wacgap

  • MD5

    410c4210eff3a61dd396b61305e567c0

  • SHA1

    dc1dccb7e8ef3612c55d41666fc393eb05c6ebfa

  • SHA256

    5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286

  • SHA512

    ca2f4c4e6417cdb94c2f15f2ab191a58efe0ce7b8cc8c11ed9628367195cf826e83adfc59922b97b71186fb56c9c375c7727f68b9a5acdec9321377a31dea3ad

  • SSDEEP

    12288:QhXq+t23PiVPDQOALPCyo79IJNin9g+6KMAnmyM:Qh32/iVPU1hoaJNS9TXfDM

Malware Config

Targets

    • Target

      5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286

    • Size

      447KB

    • MD5

      410c4210eff3a61dd396b61305e567c0

    • SHA1

      dc1dccb7e8ef3612c55d41666fc393eb05c6ebfa

    • SHA256

      5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286

    • SHA512

      ca2f4c4e6417cdb94c2f15f2ab191a58efe0ce7b8cc8c11ed9628367195cf826e83adfc59922b97b71186fb56c9c375c7727f68b9a5acdec9321377a31dea3ad

    • SSDEEP

      12288:QhXq+t23PiVPDQOALPCyo79IJNin9g+6KMAnmyM:Qh32/iVPU1hoaJNS9TXfDM

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks