General

  • Target

    aaf2e62ee2465031be3cee82585545bba2eec90593cb859321dca647cda43d68

  • Size

    839KB

  • Sample

    221123-qpfzdaee42

  • MD5

    844b6c7b3782956a323f6065b413e82f

  • SHA1

    20f02e581a987af40e2895742447e17d869aa6a5

  • SHA256

    aaf2e62ee2465031be3cee82585545bba2eec90593cb859321dca647cda43d68

  • SHA512

    64217b5d8d8506f8f5b4d3fcbfc03ae64554c8b4ea278213b935f6c4ec3bdb3d2eab23b345ae065f7e301fbb5866ff8a93d68e67002718351b7a827b8d2539e0

  • SSDEEP

    3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH

Malware Config

Targets

    • Target

      aaf2e62ee2465031be3cee82585545bba2eec90593cb859321dca647cda43d68

    • Size

      839KB

    • MD5

      844b6c7b3782956a323f6065b413e82f

    • SHA1

      20f02e581a987af40e2895742447e17d869aa6a5

    • SHA256

      aaf2e62ee2465031be3cee82585545bba2eec90593cb859321dca647cda43d68

    • SHA512

      64217b5d8d8506f8f5b4d3fcbfc03ae64554c8b4ea278213b935f6c4ec3bdb3d2eab23b345ae065f7e301fbb5866ff8a93d68e67002718351b7a827b8d2539e0

    • SSDEEP

      3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks