General

  • Target

    38202a81e40168c859d491c37b2754cd4d75a6068b0172b6530a331bcce56166

  • Size

    744KB

  • Sample

    221123-rx3zjscg3v

  • MD5

    9cd96738d7ed08fb67bc43fed91e4391

  • SHA1

    5466d544f1bb8cd81a5f9c86c7904994d710e9ad

  • SHA256

    38202a81e40168c859d491c37b2754cd4d75a6068b0172b6530a331bcce56166

  • SHA512

    a6dd616a7c159b69b066aaa13090e079f0003e65345deac62e1fd5f2c77fdd22456c0bb8dc4c71b98b8341ba6eb14343fc2dcb3bd24d1651a26c08cda5279bd4

  • SSDEEP

    3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH

Malware Config

Targets

    • Target

      38202a81e40168c859d491c37b2754cd4d75a6068b0172b6530a331bcce56166

    • Size

      744KB

    • MD5

      9cd96738d7ed08fb67bc43fed91e4391

    • SHA1

      5466d544f1bb8cd81a5f9c86c7904994d710e9ad

    • SHA256

      38202a81e40168c859d491c37b2754cd4d75a6068b0172b6530a331bcce56166

    • SHA512

      a6dd616a7c159b69b066aaa13090e079f0003e65345deac62e1fd5f2c77fdd22456c0bb8dc4c71b98b8341ba6eb14343fc2dcb3bd24d1651a26c08cda5279bd4

    • SSDEEP

      3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks