General

  • Target

    8e69b0ac412d84b3611186d381646bf8c6e8539f9e440ba37575757eb4e4c6db

  • Size

    679KB

  • Sample

    221029-qj6mvaggg3

  • MD5

    b64e5ca6e83fbb920699bd40ee6aefbb

  • SHA1

    d7a0d458d27784b9f28bcd11ed742e325651c382

  • SHA256

    8e69b0ac412d84b3611186d381646bf8c6e8539f9e440ba37575757eb4e4c6db

  • SHA512

    0f92c342ddba695d9901f93b24b9c5ddbe17c69eea5551bbf6b5dca5e9ab2b346a85beb5a855f3ccea787d3be29a326d943e9874cfbae64d57d1fb9f631625e8

  • SSDEEP

    3072:dJssXHrm2EPABbsdgVbZoAc7R+cgSkwkFFAoP4D:PXrm2EPAFsd6U7R+BFx

Malware Config

Targets

    • Target

      8e69b0ac412d84b3611186d381646bf8c6e8539f9e440ba37575757eb4e4c6db

    • Size

      679KB

    • MD5

      b64e5ca6e83fbb920699bd40ee6aefbb

    • SHA1

      d7a0d458d27784b9f28bcd11ed742e325651c382

    • SHA256

      8e69b0ac412d84b3611186d381646bf8c6e8539f9e440ba37575757eb4e4c6db

    • SHA512

      0f92c342ddba695d9901f93b24b9c5ddbe17c69eea5551bbf6b5dca5e9ab2b346a85beb5a855f3ccea787d3be29a326d943e9874cfbae64d57d1fb9f631625e8

    • SSDEEP

      3072:dJssXHrm2EPABbsdgVbZoAc7R+cgSkwkFFAoP4D:PXrm2EPAFsd6U7R+BFx

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks