General

  • Target

    2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3

  • Size

    486KB

  • Sample

    221030-2ezjhsebak

  • MD5

    826ce8e73c528bfd03b63eff6ef751a0

  • SHA1

    5cda6499c8bb54442497e0bda1ecd8cfbfbf1831

  • SHA256

    2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3

  • SHA512

    95248f98c8cc3cd353715ef4ed180c0eb8444926556d697aea81d8cc0da4e5019dadcfe35c0789dbe9accfa026bb91a5040b19ce60adef16b16536a3251cf55e

  • SSDEEP

    12288:8CyYw6a6zcNT6FYhQpHMIRfUa6QIvLuX4MguBKm3ZmZw96k6mmguRxi5WczDHh8X:8NjHQhMIuDugWKm3ZmZw96k6mmguHi5P

Malware Config

Targets

    • Target

      2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3

    • Size

      486KB

    • MD5

      826ce8e73c528bfd03b63eff6ef751a0

    • SHA1

      5cda6499c8bb54442497e0bda1ecd8cfbfbf1831

    • SHA256

      2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3

    • SHA512

      95248f98c8cc3cd353715ef4ed180c0eb8444926556d697aea81d8cc0da4e5019dadcfe35c0789dbe9accfa026bb91a5040b19ce60adef16b16536a3251cf55e

    • SSDEEP

      12288:8CyYw6a6zcNT6FYhQpHMIRfUa6QIvLuX4MguBKm3ZmZw96k6mmguRxi5WczDHh8X:8NjHQhMIuDugWKm3ZmZw96k6mmguHi5P

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks