General

  • Target

    625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c

  • Size

    486KB

  • Sample

    221030-cm27yagdh4

  • MD5

    850e53749b5da616d21bce97e92c2d90

  • SHA1

    763d2fe2d983289c403cc88554c23f2f19d58499

  • SHA256

    625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c

  • SHA512

    fb8536726ad34d25a130ca5cafab8b8218e0fa857835a3d794bfaa4b1172d1f3cbdd95d7f511069443e2b1eaacef40ae678352ae0e9662cf97de7792a9077b9f

  • SSDEEP

    12288:mPPbulHLsM5XOTLzEoYsh69mY0oQHjtSv+Tslc:YPYsaGLI6o505UvU

Malware Config

Targets

    • Target

      625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c

    • Size

      486KB

    • MD5

      850e53749b5da616d21bce97e92c2d90

    • SHA1

      763d2fe2d983289c403cc88554c23f2f19d58499

    • SHA256

      625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c

    • SHA512

      fb8536726ad34d25a130ca5cafab8b8218e0fa857835a3d794bfaa4b1172d1f3cbdd95d7f511069443e2b1eaacef40ae678352ae0e9662cf97de7792a9077b9f

    • SSDEEP

      12288:mPPbulHLsM5XOTLzEoYsh69mY0oQHjtSv+Tslc:YPYsaGLI6o505UvU

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks