General

  • Target

    a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf

  • Size

    726KB

  • Sample

    221030-17qxeadhcp

  • MD5

    a19cb66b2f1f21abde621ec75318bcc0

  • SHA1

    6a678d3b7a5a02cba28a86773036b59f9282a3ab

  • SHA256

    a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf

  • SHA512

    7b8bba792ac027f4e7048d2a849044e38b683d9af9eac1f5cdebab3695457ece89e57f160b6a89030cb2eb70b3e05501ad1e73a265b156f955e62a05fec7e583

  • SSDEEP

    12288:e89Vgo/vla6+iH0ZpD0s0CwZP/p0yzd3BNJDRAkqwBf9dOI8FODIltJmvct:j/ggvwzN0s0h50srNVRAktfTOI8FO6m8

Malware Config

Targets

    • Target

      a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf

    • Size

      726KB

    • MD5

      a19cb66b2f1f21abde621ec75318bcc0

    • SHA1

      6a678d3b7a5a02cba28a86773036b59f9282a3ab

    • SHA256

      a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf

    • SHA512

      7b8bba792ac027f4e7048d2a849044e38b683d9af9eac1f5cdebab3695457ece89e57f160b6a89030cb2eb70b3e05501ad1e73a265b156f955e62a05fec7e583

    • SSDEEP

      12288:e89Vgo/vla6+iH0ZpD0s0CwZP/p0yzd3BNJDRAkqwBf9dOI8FODIltJmvct:j/ggvwzN0s0h50srNVRAktfTOI8FO6m8

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks