General

  • Target

    089c9a7d4a37db54b685faf90b9f9869833b8376b4a472852292b3b318f04b2b.exe

  • Size

    7.3MB

  • Sample

    221018-xw7t1adfak

  • MD5

    14444765d3a9c6b797dc13e1d7638015

  • SHA1

    614b3ece34cfc0639d4e8ff265986a50ad8b620e

  • SHA256

    089c9a7d4a37db54b685faf90b9f9869833b8376b4a472852292b3b318f04b2b

  • SHA512

    4c95f3b1cbecfc1539314d32e08a7880e68c09c2a9ac68fcd8977fb8d0586823e4117b037471fb3e3827e10553a6a75c15a494d5e66b64969b55e96a13b8a4ed

  • SSDEEP

    196608:91ONXlHf3ztl2mVmZXKo9jGHsowhFNMewhOOGsv01G:3ONXlHDZ8gG1WxGsGG

Malware Config

Targets

    • Target

      089c9a7d4a37db54b685faf90b9f9869833b8376b4a472852292b3b318f04b2b.exe

    • Size

      7.3MB

    • MD5

      14444765d3a9c6b797dc13e1d7638015

    • SHA1

      614b3ece34cfc0639d4e8ff265986a50ad8b620e

    • SHA256

      089c9a7d4a37db54b685faf90b9f9869833b8376b4a472852292b3b318f04b2b

    • SHA512

      4c95f3b1cbecfc1539314d32e08a7880e68c09c2a9ac68fcd8977fb8d0586823e4117b037471fb3e3827e10553a6a75c15a494d5e66b64969b55e96a13b8a4ed

    • SSDEEP

      196608:91ONXlHf3ztl2mVmZXKo9jGHsowhFNMewhOOGsv01G:3ONXlHDZ8gG1WxGsGG

    • Modifies Windows Defender Real-time Protection settings

    • Windows security bypass

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks