General

  • Target

    77467a0700e9d1ea313de85c0c789d49527a8fcc0ce786e12f4972a581444844

  • Size

    68KB

  • Sample

    221020-r4madaace6

  • MD5

    9629889570bbe900a912d99f05bf8c43

  • SHA1

    270403ccda4ee7eb1d014d3a3ed57c78a1f1f8ce

  • SHA256

    77467a0700e9d1ea313de85c0c789d49527a8fcc0ce786e12f4972a581444844

  • SHA512

    6bc61606e23958e52e1ab568c876d8128d12ccc764f4e3eec0167f03178fa44609c4edb9fb06fa68bbf37775c3e6b0a0b57992d5aee0e30361a5a937a9d8f147

  • SSDEEP

    1536:2/n0QGFS8ahigBBSDUpuEw0uGbjXpm8kRpW1zJaimOBeX01eIFhVnouy8:rS9hRGyuEL1b7cXvQVQX2eo7out

Malware Config

Targets

    • Target

      77467a0700e9d1ea313de85c0c789d49527a8fcc0ce786e12f4972a581444844

    • Size

      68KB

    • MD5

      9629889570bbe900a912d99f05bf8c43

    • SHA1

      270403ccda4ee7eb1d014d3a3ed57c78a1f1f8ce

    • SHA256

      77467a0700e9d1ea313de85c0c789d49527a8fcc0ce786e12f4972a581444844

    • SHA512

      6bc61606e23958e52e1ab568c876d8128d12ccc764f4e3eec0167f03178fa44609c4edb9fb06fa68bbf37775c3e6b0a0b57992d5aee0e30361a5a937a9d8f147

    • SSDEEP

      1536:2/n0QGFS8ahigBBSDUpuEw0uGbjXpm8kRpW1zJaimOBeX01eIFhVnouy8:rS9hRGyuEL1b7cXvQVQX2eo7out

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks