General

  • Target

    3958bcdfb3c9e629319e5e6445ca58d955183bc967df50c56511f31cb456e74a

  • Size

    768KB

  • Sample

    221123-ltd85acc49

  • MD5

    9da3ba8eef16a9fa35a9bc969f5325da

  • SHA1

    adbbef68b21d31235ef87cd89e2e953b8d03adf1

  • SHA256

    3958bcdfb3c9e629319e5e6445ca58d955183bc967df50c56511f31cb456e74a

  • SHA512

    5ace7c786ed71ec9386b613830572c89ce404966d0b44b8a69c17e8cd57aca95c7c5fd0e81e83abd9b3e2aa7c15248a8c343d8330c9cb85a251db7064a1f744a

  • SSDEEP

    1536:9NhENNo2oa5pHwAVvu0IysOPv3YdI3EpCK+V5iR/yKoDn66XujshkGXE7rFKh:9gN5ogyJ0XgdsEIKlyKo26Jkj7rF

Malware Config

Targets

    • Target

      3958bcdfb3c9e629319e5e6445ca58d955183bc967df50c56511f31cb456e74a

    • Size

      768KB

    • MD5

      9da3ba8eef16a9fa35a9bc969f5325da

    • SHA1

      adbbef68b21d31235ef87cd89e2e953b8d03adf1

    • SHA256

      3958bcdfb3c9e629319e5e6445ca58d955183bc967df50c56511f31cb456e74a

    • SHA512

      5ace7c786ed71ec9386b613830572c89ce404966d0b44b8a69c17e8cd57aca95c7c5fd0e81e83abd9b3e2aa7c15248a8c343d8330c9cb85a251db7064a1f744a

    • SSDEEP

      1536:9NhENNo2oa5pHwAVvu0IysOPv3YdI3EpCK+V5iR/yKoDn66XujshkGXE7rFKh:9gN5ogyJ0XgdsEIKlyKo26Jkj7rF

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks