General

  • Target

    9ee01526e299a3d9cd8df731de29c873fb84b175a2e15f9d7e9f39c4a87edd33

  • Size

    1.1MB

  • Sample

    221107-njjrzafhap

  • MD5

    0946d7182802694b8b545ad14e980fda

  • SHA1

    4b1950a273856168c81c9b2e2752f239c9f19239

  • SHA256

    9ee01526e299a3d9cd8df731de29c873fb84b175a2e15f9d7e9f39c4a87edd33

  • SHA512

    6133c7f9fb2f6bed86f5480248f8f1c8b7a9d07c195ae0e1bb89831e456734f46b36ebbd84d5821e2b580becd6c062b5e0bb2ee94267963b9cae4d20ffb4ae19

  • SSDEEP

    3072:OXznUvXS7aNVt89lDJxH0zPDvYM0VzA7t:lPbNV29lP0z7vB0Vs

Malware Config

Targets

    • Target

      9ee01526e299a3d9cd8df731de29c873fb84b175a2e15f9d7e9f39c4a87edd33

    • Size

      1.1MB

    • MD5

      0946d7182802694b8b545ad14e980fda

    • SHA1

      4b1950a273856168c81c9b2e2752f239c9f19239

    • SHA256

      9ee01526e299a3d9cd8df731de29c873fb84b175a2e15f9d7e9f39c4a87edd33

    • SHA512

      6133c7f9fb2f6bed86f5480248f8f1c8b7a9d07c195ae0e1bb89831e456734f46b36ebbd84d5821e2b580becd6c062b5e0bb2ee94267963b9cae4d20ffb4ae19

    • SSDEEP

      3072:OXznUvXS7aNVt89lDJxH0zPDvYM0VzA7t:lPbNV29lP0z7vB0Vs

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks