General

  • Target

    62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f

  • Size

    498KB

  • Sample

    221121-lck1cage6v

  • MD5

    3a5335a6d44a6a4abada30a7926f85c0

  • SHA1

    c424c85867eaa40cbb1eafaed04f310bdbdf9f08

  • SHA256

    62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f

  • SHA512

    2d799b47592761d10a2000faada162162ce3935d4f1c2cf1387d8fdc5807321e891a624eb04770b38448ee327d0ae92652fd5c7c0174027306f1fdc7439a6abb

  • SSDEEP

    12288:1Ikuy52PEqLz+oh6bhZXXu7aWSP/1oRao+VCWf7dDYe3:442cjl8781oRaVCWf7dUu

Malware Config

Targets

    • Target

      62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f

    • Size

      498KB

    • MD5

      3a5335a6d44a6a4abada30a7926f85c0

    • SHA1

      c424c85867eaa40cbb1eafaed04f310bdbdf9f08

    • SHA256

      62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f

    • SHA512

      2d799b47592761d10a2000faada162162ce3935d4f1c2cf1387d8fdc5807321e891a624eb04770b38448ee327d0ae92652fd5c7c0174027306f1fdc7439a6abb

    • SSDEEP

      12288:1Ikuy52PEqLz+oh6bhZXXu7aWSP/1oRao+VCWf7dDYe3:442cjl8781oRaVCWf7dUu

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks