General

  • Target

    24034621fb089223807ae4013fe761917c3c185c09b106c36ed8f897c8501cbc

  • Size

    1.9MB

  • Sample

    221030-jde5daaeer

  • MD5

    84ecdc6ed6bbc62cc62153aad85f7c66

  • SHA1

    6a5697f831fc5c0f92ae61bf01f1ff019fd75360

  • SHA256

    24034621fb089223807ae4013fe761917c3c185c09b106c36ed8f897c8501cbc

  • SHA512

    3fd4f80612c5527c487ea65f64e7b5e03bf34fc4662489ce8b6872c46be240aadceb404b12fe8b08a77baf4337a1c499a1c00dba751b31bad466d10f9c792791

  • SSDEEP

    3072:qXJCFRSt63wPwWYhVTjJ5cHymR7w0YmS8O:LdnWYD95z4w0Dt

Malware Config

Targets

    • Target

      24034621fb089223807ae4013fe761917c3c185c09b106c36ed8f897c8501cbc

    • Size

      1.9MB

    • MD5

      84ecdc6ed6bbc62cc62153aad85f7c66

    • SHA1

      6a5697f831fc5c0f92ae61bf01f1ff019fd75360

    • SHA256

      24034621fb089223807ae4013fe761917c3c185c09b106c36ed8f897c8501cbc

    • SHA512

      3fd4f80612c5527c487ea65f64e7b5e03bf34fc4662489ce8b6872c46be240aadceb404b12fe8b08a77baf4337a1c499a1c00dba751b31bad466d10f9c792791

    • SSDEEP

      3072:qXJCFRSt63wPwWYhVTjJ5cHymR7w0YmS8O:LdnWYD95z4w0Dt

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks