General

  • Target

    0e65a41b9e8804ebecaad93428945651e485b0a9d438ea4711ea9988140a4ddf

  • Size

    632KB

  • Sample

    221106-lqfb1sebg4

  • MD5

    14954e09742bdc8a5a729278aeae06b0

  • SHA1

    a07390da0c517c6b38595f340c51b79a8a0c5422

  • SHA256

    0e65a41b9e8804ebecaad93428945651e485b0a9d438ea4711ea9988140a4ddf

  • SHA512

    26032e5e979dfc852cb59673d6835a64b8b02787526b743477571fb4a583fe865861fb7481344ce422f41656a5c7b891bbf13f89d62b4218c26a966e19998913

  • SSDEEP

    3072:OwHl/Gnrl2wGELlyzXq4D2N3v5FQLffCv7oVJNpUpnrT8vp:tB4rlryzIFQLfqvsPfSUv

Malware Config

Targets

    • Target

      0e65a41b9e8804ebecaad93428945651e485b0a9d438ea4711ea9988140a4ddf

    • Size

      632KB

    • MD5

      14954e09742bdc8a5a729278aeae06b0

    • SHA1

      a07390da0c517c6b38595f340c51b79a8a0c5422

    • SHA256

      0e65a41b9e8804ebecaad93428945651e485b0a9d438ea4711ea9988140a4ddf

    • SHA512

      26032e5e979dfc852cb59673d6835a64b8b02787526b743477571fb4a583fe865861fb7481344ce422f41656a5c7b891bbf13f89d62b4218c26a966e19998913

    • SSDEEP

      3072:OwHl/Gnrl2wGELlyzXq4D2N3v5FQLffCv7oVJNpUpnrT8vp:tB4rlryzIFQLfqvsPfSUv

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks