General

  • Target

    ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693

  • Size

    822KB

  • Sample

    221124-aswagafc37

  • MD5

    35a799cc4f89847b0f61c901d7f4bdaf

  • SHA1

    2533f7d078fee6726cda9b8e15fa35ba0e6f2911

  • SHA256

    ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693

  • SHA512

    5544e1c523867db5a4fa8ae3cc46565347ee547eeeed9b353997211ec17254a0263045d5cc09f901a371952be393d30b94e674dbb6b76a2becb69e74ba346458

  • SSDEEP

    3072:XD80DhgAPXSOYjEC8nxEp4l79pEvkMDGQA40diM:XDzhnPCOS8n+s7epiQAN

Malware Config

Targets

    • Target

      ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693

    • Size

      822KB

    • MD5

      35a799cc4f89847b0f61c901d7f4bdaf

    • SHA1

      2533f7d078fee6726cda9b8e15fa35ba0e6f2911

    • SHA256

      ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693

    • SHA512

      5544e1c523867db5a4fa8ae3cc46565347ee547eeeed9b353997211ec17254a0263045d5cc09f901a371952be393d30b94e674dbb6b76a2becb69e74ba346458

    • SSDEEP

      3072:XD80DhgAPXSOYjEC8nxEp4l79pEvkMDGQA40diM:XDzhnPCOS8n+s7epiQAN

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks