General

  • Target

    822e490667a3734eb5015e56a3c5c3816526a70f70abca6ab204b9efd67a0d5d

  • Size

    255KB

  • Sample

    221123-zv677aha2y

  • MD5

    c7cd0e88b430c43ed486f0df031badbd

  • SHA1

    da9de6a66d0bd33b6a862ddd3ca90d268170b143

  • SHA256

    822e490667a3734eb5015e56a3c5c3816526a70f70abca6ab204b9efd67a0d5d

  • SHA512

    a846fd76309a1c60f53aa1260c93d7d6a8f238886f5d1ece7a5e5813d508bbca6136a63473c40330ee88612c6e85ce3524cb5a3966661d1b7f6b703305f4d462

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ0:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI1

Malware Config

Targets

    • Target

      822e490667a3734eb5015e56a3c5c3816526a70f70abca6ab204b9efd67a0d5d

    • Size

      255KB

    • MD5

      c7cd0e88b430c43ed486f0df031badbd

    • SHA1

      da9de6a66d0bd33b6a862ddd3ca90d268170b143

    • SHA256

      822e490667a3734eb5015e56a3c5c3816526a70f70abca6ab204b9efd67a0d5d

    • SHA512

      a846fd76309a1c60f53aa1260c93d7d6a8f238886f5d1ece7a5e5813d508bbca6136a63473c40330ee88612c6e85ce3524cb5a3966661d1b7f6b703305f4d462

    • SSDEEP

      3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ0:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI1

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks