General

  • Target

    2f3946a7b96590dd9cfc7e561b5df384cf1d43b8c10ebf91a4a023d4ce62bb7c

  • Size

    255KB

  • Sample

    221123-xsap4aah3v

  • MD5

    524df86307d2c6fe5a20d4246526b836

  • SHA1

    4f06ede6d39c4dffbd0ec076119c4a3ff679c4bd

  • SHA256

    2f3946a7b96590dd9cfc7e561b5df384cf1d43b8c10ebf91a4a023d4ce62bb7c

  • SHA512

    2bde40f43e0c29c686b7acfd99359ec9af5001bb62683bae029111d46d83cc1853a19761e67442cd84dadb448ead51e718f810cf02bcf4b70953dbd7d5bc610c

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJE:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI9

Malware Config

Targets

    • Target

      2f3946a7b96590dd9cfc7e561b5df384cf1d43b8c10ebf91a4a023d4ce62bb7c

    • Size

      255KB

    • MD5

      524df86307d2c6fe5a20d4246526b836

    • SHA1

      4f06ede6d39c4dffbd0ec076119c4a3ff679c4bd

    • SHA256

      2f3946a7b96590dd9cfc7e561b5df384cf1d43b8c10ebf91a4a023d4ce62bb7c

    • SHA512

      2bde40f43e0c29c686b7acfd99359ec9af5001bb62683bae029111d46d83cc1853a19761e67442cd84dadb448ead51e718f810cf02bcf4b70953dbd7d5bc610c

    • SSDEEP

      3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJE:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI9

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks