General

  • Target

    9146bb023da45a898d178c0be8f8743bf7bf18a01974b47b7641e322ba2f80ec

  • Size

    492KB

  • Sample

    221106-yav4rahbg3

  • MD5

    0dfd0db27ac92cd9c8d041551f935d30

  • SHA1

    e284e25d6a7e90aba894574880acf949728de470

  • SHA256

    9146bb023da45a898d178c0be8f8743bf7bf18a01974b47b7641e322ba2f80ec

  • SHA512

    d747c937b1da426cfe0f08cc478d9ef7b5538ccacf767379c089cc673aaa41b62158305b5efa0ff800c839ee1adb5e589bb751f5703494e69a2ecbe91e61a196

  • SSDEEP

    12288:BJZMMdlMW/bEs2IqfV5WJZ2TccP+GLTlhBgel5C5CoXFdLP:BKW/bEnvWJApRjdl5C/H

Malware Config

Targets

    • Target

      9146bb023da45a898d178c0be8f8743bf7bf18a01974b47b7641e322ba2f80ec

    • Size

      492KB

    • MD5

      0dfd0db27ac92cd9c8d041551f935d30

    • SHA1

      e284e25d6a7e90aba894574880acf949728de470

    • SHA256

      9146bb023da45a898d178c0be8f8743bf7bf18a01974b47b7641e322ba2f80ec

    • SHA512

      d747c937b1da426cfe0f08cc478d9ef7b5538ccacf767379c089cc673aaa41b62158305b5efa0ff800c839ee1adb5e589bb751f5703494e69a2ecbe91e61a196

    • SSDEEP

      12288:BJZMMdlMW/bEs2IqfV5WJZ2TccP+GLTlhBgel5C5CoXFdLP:BKW/bEnvWJApRjdl5C/H

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks