General

  • Target

    11c883ccc369c21d9bad6ff89bbf09807b8d764c0a42a2e18197449fa24c5029

  • Size

    255KB

  • Sample

    221123-zswnnsdf95

  • MD5

    b5e322cc4a713bcc0fe5fd0cd32bdcff

  • SHA1

    094268e0a8fe9e7eaf4b8030892973e70117678f

  • SHA256

    11c883ccc369c21d9bad6ff89bbf09807b8d764c0a42a2e18197449fa24c5029

  • SHA512

    552a6cb1ef1e10273b1211279c6b1229cee2d455d16faef4cf8e6d750e9b6ab9b484e542587fda151cfc1afdb396364cef2c2c5dd2ebb0cf4d5fdcfaab3eedce

  • SSDEEP

    6144:1xlZam+akqx6YQJXcNlEHUIQeE3mmBWFv6y:Plf5j6zCNa0xeE3mX

Malware Config

Targets

    • Target

      11c883ccc369c21d9bad6ff89bbf09807b8d764c0a42a2e18197449fa24c5029

    • Size

      255KB

    • MD5

      b5e322cc4a713bcc0fe5fd0cd32bdcff

    • SHA1

      094268e0a8fe9e7eaf4b8030892973e70117678f

    • SHA256

      11c883ccc369c21d9bad6ff89bbf09807b8d764c0a42a2e18197449fa24c5029

    • SHA512

      552a6cb1ef1e10273b1211279c6b1229cee2d455d16faef4cf8e6d750e9b6ab9b484e542587fda151cfc1afdb396364cef2c2c5dd2ebb0cf4d5fdcfaab3eedce

    • SSDEEP

      6144:1xlZam+akqx6YQJXcNlEHUIQeE3mmBWFv6y:Plf5j6zCNa0xeE3mX

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks