General

  • Target

    7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528

  • Size

    255KB

  • Sample

    221123-zwjhhsdh85

  • MD5

    0118fafb572f326409e0a7c487ede3ae

  • SHA1

    59454507736c67fc557bfcb89802c5b407f5c604

  • SHA256

    7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528

  • SHA512

    70cfbaeaf7fd4ae5be1bfe24e91959f36eb49e4354e243484e8a50d356b33c730cf07a13ecc976578ec8d4f19af73315f92ccc154881fd5e4728fda601aa8924

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJs:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI/

Malware Config

Targets

    • Target

      7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528

    • Size

      255KB

    • MD5

      0118fafb572f326409e0a7c487ede3ae

    • SHA1

      59454507736c67fc557bfcb89802c5b407f5c604

    • SHA256

      7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528

    • SHA512

      70cfbaeaf7fd4ae5be1bfe24e91959f36eb49e4354e243484e8a50d356b33c730cf07a13ecc976578ec8d4f19af73315f92ccc154881fd5e4728fda601aa8924

    • SSDEEP

      3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJs:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI/

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks