General

  • Target

    20756e16584e2d7889b73c7406e47dd90c949fe4b7bcacecd0e7369cbb833fa3

  • Size

    494KB

  • Sample

    221106-ycxelahcf9

  • MD5

    21700ee1205e294877987997f80aa2b0

  • SHA1

    955f79fb79fc88cb430b754a82b465f66c0ec872

  • SHA256

    20756e16584e2d7889b73c7406e47dd90c949fe4b7bcacecd0e7369cbb833fa3

  • SHA512

    36abb77248bdd3b946eb47aa2825fa2030b3435fbee8c75d4744945f089ef971f099d9c473f2aaa031f4d5631156540c7f199226ec29df2607a485bc3930110c

  • SSDEEP

    12288:C97Gq9bFl9cJ5QB1dSc6dFfIB/C54UlZjMcUUhggHYNzHUNFHU78:U75lW86oBK54UlZjMcugqz0rHQ8

Malware Config

Targets

    • Target

      20756e16584e2d7889b73c7406e47dd90c949fe4b7bcacecd0e7369cbb833fa3

    • Size

      494KB

    • MD5

      21700ee1205e294877987997f80aa2b0

    • SHA1

      955f79fb79fc88cb430b754a82b465f66c0ec872

    • SHA256

      20756e16584e2d7889b73c7406e47dd90c949fe4b7bcacecd0e7369cbb833fa3

    • SHA512

      36abb77248bdd3b946eb47aa2825fa2030b3435fbee8c75d4744945f089ef971f099d9c473f2aaa031f4d5631156540c7f199226ec29df2607a485bc3930110c

    • SSDEEP

      12288:C97Gq9bFl9cJ5QB1dSc6dFfIB/C54UlZjMcUUhggHYNzHUNFHU78:U75lW86oBK54UlZjMcugqz0rHQ8

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks