General

  • Target

    d640f7f712db472850a2471d9c73bd681825b7f9ab8962cfa13d6b3983f87160

  • Size

    607KB

  • Sample

    221020-hh7vhsaafr

  • MD5

    804e5947e7572720deb6a87bfe23037a

  • SHA1

    5843170c427ecf83d14d9904afe309da0b056cee

  • SHA256

    d640f7f712db472850a2471d9c73bd681825b7f9ab8962cfa13d6b3983f87160

  • SHA512

    6ae685448b749ec65f3537c27d61d891dacc3707bc371ded98657eec7283a23b7f0cd34ea59cbfd73007ae436f494b3912c0b9a746e641990ad26ecd0cb330ab

  • SSDEEP

    1536:iZhXpRC+m0zJ2s5Pe7CCPi87lvXndgI0Ue11/cAyGB2mXccp7a+vlpJYqc6F501G:sXpk+mcJZPPul/A/fBL5aPa5S4

Malware Config

Targets

    • Target

      d640f7f712db472850a2471d9c73bd681825b7f9ab8962cfa13d6b3983f87160

    • Size

      607KB

    • MD5

      804e5947e7572720deb6a87bfe23037a

    • SHA1

      5843170c427ecf83d14d9904afe309da0b056cee

    • SHA256

      d640f7f712db472850a2471d9c73bd681825b7f9ab8962cfa13d6b3983f87160

    • SHA512

      6ae685448b749ec65f3537c27d61d891dacc3707bc371ded98657eec7283a23b7f0cd34ea59cbfd73007ae436f494b3912c0b9a746e641990ad26ecd0cb330ab

    • SSDEEP

      1536:iZhXpRC+m0zJ2s5Pe7CCPi87lvXndgI0Ue11/cAyGB2mXccp7a+vlpJYqc6F501G:sXpk+mcJZPPul/A/fBL5aPa5S4

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks