General

  • Target

    b1964713a0feed48c132d06d2c6a11f3c41fd700efca283311a5133ba553a2fb

  • Size

    255KB

  • Sample

    221011-z7dfmsehh8

  • MD5

    4bd5c40959b71c897229aba22ef0f6a1

  • SHA1

    a382a5864ddbc0b8728d18c232b39dd96f50c73f

  • SHA256

    b1964713a0feed48c132d06d2c6a11f3c41fd700efca283311a5133ba553a2fb

  • SHA512

    e44cb9b23645c51b77caebf031ffd981c12939644a911f2fb387612cd4a9951c2274bfb42f5ec06f69002a63a5eccc5c0f8197eef6c147c35c9d62beb270a1c5

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJV:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIw

Malware Config

Targets

    • Target

      b1964713a0feed48c132d06d2c6a11f3c41fd700efca283311a5133ba553a2fb

    • Size

      255KB

    • MD5

      4bd5c40959b71c897229aba22ef0f6a1

    • SHA1

      a382a5864ddbc0b8728d18c232b39dd96f50c73f

    • SHA256

      b1964713a0feed48c132d06d2c6a11f3c41fd700efca283311a5133ba553a2fb

    • SHA512

      e44cb9b23645c51b77caebf031ffd981c12939644a911f2fb387612cd4a9951c2274bfb42f5ec06f69002a63a5eccc5c0f8197eef6c147c35c9d62beb270a1c5

    • SSDEEP

      3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJV:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIw

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks