General

  • Target

    a9b05637be91f963cb0c8806af7dcc0093f4a210d68bf51c116ae03cf3628a29

  • Size

    244KB

  • Sample

    221123-s8cr6sgd21

  • MD5

    f823136cc75e246328d0a41983fc63d4

  • SHA1

    6ed5ab4a7a16039c9a83b85281e1795c6e464396

  • SHA256

    a9b05637be91f963cb0c8806af7dcc0093f4a210d68bf51c116ae03cf3628a29

  • SHA512

    4f1607d6938ebc690a43699e605381669195ad44f82a73104608791e7263db16cdb28350f5dd388cd94f87d30f3b327f647b54e7f120b1a75fc4e5ab9aea9b4b

  • SSDEEP

    3072:BOJoplT2mX2MIaVLXM0Lgqfp7+H4De2dN+K/p7ZwtD6:PlTTtIOXjgqt+0Zp1wl6

Malware Config

Targets

    • Target

      a9b05637be91f963cb0c8806af7dcc0093f4a210d68bf51c116ae03cf3628a29

    • Size

      244KB

    • MD5

      f823136cc75e246328d0a41983fc63d4

    • SHA1

      6ed5ab4a7a16039c9a83b85281e1795c6e464396

    • SHA256

      a9b05637be91f963cb0c8806af7dcc0093f4a210d68bf51c116ae03cf3628a29

    • SHA512

      4f1607d6938ebc690a43699e605381669195ad44f82a73104608791e7263db16cdb28350f5dd388cd94f87d30f3b327f647b54e7f120b1a75fc4e5ab9aea9b4b

    • SSDEEP

      3072:BOJoplT2mX2MIaVLXM0Lgqfp7+H4De2dN+K/p7ZwtD6:PlTTtIOXjgqt+0Zp1wl6

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks