General

  • Target

    604235a8923bcc41529c7662f5dc0b5e3be2f720e9b9ff15344f453cc9b3115b

  • Size

    255KB

  • Sample

    221124-bdpd2sgg55

  • MD5

    36aced954a82292490e98f4ce0ca5720

  • SHA1

    857fd81aa5a71b6e1e47e121eace3a968f2ee374

  • SHA256

    604235a8923bcc41529c7662f5dc0b5e3be2f720e9b9ff15344f453cc9b3115b

  • SHA512

    ee2a10e5e8832919390ffe7659113aac5f1693e768cfa7d584c7390bffcf1ce5b3cde195bcace85bb0934ae7f7ae00580fd2e184871f47f56fa34acbb05c68ef

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJY:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIH

Malware Config

Targets

    • Target

      604235a8923bcc41529c7662f5dc0b5e3be2f720e9b9ff15344f453cc9b3115b

    • Size

      255KB

    • MD5

      36aced954a82292490e98f4ce0ca5720

    • SHA1

      857fd81aa5a71b6e1e47e121eace3a968f2ee374

    • SHA256

      604235a8923bcc41529c7662f5dc0b5e3be2f720e9b9ff15344f453cc9b3115b

    • SHA512

      ee2a10e5e8832919390ffe7659113aac5f1693e768cfa7d584c7390bffcf1ce5b3cde195bcace85bb0934ae7f7ae00580fd2e184871f47f56fa34acbb05c68ef

    • SSDEEP

      3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJY:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIH

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Winlogon Helper DLL

1
T1004

Defense Evasion

Hidden Files and Directories

2
T1158

Modify Registry

7
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks