General

  • Target

    bc77d4e07ccb007aab4860cee151a1e34d8dc77a31c09ffb639983927d22d0bb

  • Size

    855KB

  • Sample

    221123-qg7gcsea49

  • MD5

    4425b45b99f2bfd386e81e3283f6bae7

  • SHA1

    79d666ce93787e344ed1599c012f5484d4c71b31

  • SHA256

    bc77d4e07ccb007aab4860cee151a1e34d8dc77a31c09ffb639983927d22d0bb

  • SHA512

    df2fc221f4946bd517c3f3c6b00d74bbba871909b82eb374ce27350857bcf752c333cdb85f615df231ea2f68028dca4be520db3e88a5102a937f3662e160d1b0

  • SSDEEP

    1536:ybcbXVDMo9fgw5Y0ZlUmp/xLVQ8GW9AWPdApTbJ7mLcaQ9yrKYcU:yWMot5Y0Z2enQ8G0AVpTTaOyrv

Malware Config

Targets

    • Target

      bc77d4e07ccb007aab4860cee151a1e34d8dc77a31c09ffb639983927d22d0bb

    • Size

      855KB

    • MD5

      4425b45b99f2bfd386e81e3283f6bae7

    • SHA1

      79d666ce93787e344ed1599c012f5484d4c71b31

    • SHA256

      bc77d4e07ccb007aab4860cee151a1e34d8dc77a31c09ffb639983927d22d0bb

    • SHA512

      df2fc221f4946bd517c3f3c6b00d74bbba871909b82eb374ce27350857bcf752c333cdb85f615df231ea2f68028dca4be520db3e88a5102a937f3662e160d1b0

    • SSDEEP

      1536:ybcbXVDMo9fgw5Y0ZlUmp/xLVQ8GW9AWPdApTbJ7mLcaQ9yrKYcU:yWMot5Y0Z2enQ8G0AVpTTaOyrv

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks