General

  • Target

    file.exe

  • Size

    7.3MB

  • Sample

    221123-qykc6aac3t

  • MD5

    1d403a08252cb0cea368c5a2383efbf1

  • SHA1

    ace16e30c1f12c22ec655caf04b62abda3f2049e

  • SHA256

    dce6cdd2c122b887725c2a60ec7761a93c1ead60ba78d49aff5677161fad4c63

  • SHA512

    0c7706a396914174524301a0821aed281ad1b742ea1e3a9c2757558188d6732b09f3f8e510807f5ec369639118f0f2a85f6c5650067bb78c5cc488d6d5ce4eab

  • SSDEEP

    196608:91OUh4w9xODsuDG6jl1ac/jkkeFXgQV/BQekON18vntX:3OcxO9DHF0X5QexantX

Malware Config

Targets

    • Target

      file.exe

    • Size

      7.3MB

    • MD5

      1d403a08252cb0cea368c5a2383efbf1

    • SHA1

      ace16e30c1f12c22ec655caf04b62abda3f2049e

    • SHA256

      dce6cdd2c122b887725c2a60ec7761a93c1ead60ba78d49aff5677161fad4c63

    • SHA512

      0c7706a396914174524301a0821aed281ad1b742ea1e3a9c2757558188d6732b09f3f8e510807f5ec369639118f0f2a85f6c5650067bb78c5cc488d6d5ce4eab

    • SSDEEP

      196608:91OUh4w9xODsuDG6jl1ac/jkkeFXgQV/BQekON18vntX:3OcxO9DHF0X5QexantX

    • Modifies Windows Defender Real-time Protection settings

    • Windows security bypass

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks