General

  • Target

    6aee58fcfa910dac44412454b46248722efccf910977b39a1c378b1845d4328f

  • Size

    542KB

  • Sample

    221106-ybm5jabfdj

  • MD5

    09464ae0e159d83c5c0abd634b0396a0

  • SHA1

    f9dffacd7db8cde7532964e0c2f770934c14ef66

  • SHA256

    6aee58fcfa910dac44412454b46248722efccf910977b39a1c378b1845d4328f

  • SHA512

    0a108535762e219a858e06493d3c427a080869c06cf0e08202580282dfca8e282049eb3d6e88013dd21a95262d3fbc3aaf86b403eb7fbaa5d57527097d8efd5b

  • SSDEEP

    6144:yzHwHX0Et0JB7G8S3Bg8yysVuaib/SYZsV8tN+pIbegk7mpYgNfPknw7fZ0K/3uL:y0XwJGJRgNuaibveSNkOx0KP3bLEl

Malware Config

Targets

    • Target

      6aee58fcfa910dac44412454b46248722efccf910977b39a1c378b1845d4328f

    • Size

      542KB

    • MD5

      09464ae0e159d83c5c0abd634b0396a0

    • SHA1

      f9dffacd7db8cde7532964e0c2f770934c14ef66

    • SHA256

      6aee58fcfa910dac44412454b46248722efccf910977b39a1c378b1845d4328f

    • SHA512

      0a108535762e219a858e06493d3c427a080869c06cf0e08202580282dfca8e282049eb3d6e88013dd21a95262d3fbc3aaf86b403eb7fbaa5d57527097d8efd5b

    • SSDEEP

      6144:yzHwHX0Et0JB7G8S3Bg8yysVuaib/SYZsV8tN+pIbegk7mpYgNfPknw7fZ0K/3uL:y0XwJGJRgNuaibveSNkOx0KP3bLEl

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks