General

  • Target

    01942e3bddff35bab24243924bee4a9a9a1f2f5912f604b5f1166195263a0fdb

  • Size

    242KB

  • Sample

    221124-jrpkzaaa36

  • MD5

    debe2eef100475a3f04b089c8fdd03fb

  • SHA1

    caed913841ac8b35c791833c729fd838b6602be5

  • SHA256

    01942e3bddff35bab24243924bee4a9a9a1f2f5912f604b5f1166195263a0fdb

  • SHA512

    aa9e501da74ef37c1778c3c3200ad0427ed8970d9c0d3e82baa8cc71b0025939a6c5521b6cccfe4f93dc58d1503123f3a10b24bb451e9584790aa89e7312e9e6

  • SSDEEP

    1536:X2n2z/NfmeGrObqqvg5uJhy1haQ2R27sbXu7VUFm10IMSPzY2y76ldFkQZbe4fyQ:wKBmZGqqvgyhy1QRZaum1HBY2uKVDf

Malware Config

Targets

    • Target

      01942e3bddff35bab24243924bee4a9a9a1f2f5912f604b5f1166195263a0fdb

    • Size

      242KB

    • MD5

      debe2eef100475a3f04b089c8fdd03fb

    • SHA1

      caed913841ac8b35c791833c729fd838b6602be5

    • SHA256

      01942e3bddff35bab24243924bee4a9a9a1f2f5912f604b5f1166195263a0fdb

    • SHA512

      aa9e501da74ef37c1778c3c3200ad0427ed8970d9c0d3e82baa8cc71b0025939a6c5521b6cccfe4f93dc58d1503123f3a10b24bb451e9584790aa89e7312e9e6

    • SSDEEP

      1536:X2n2z/NfmeGrObqqvg5uJhy1haQ2R27sbXu7VUFm10IMSPzY2y76ldFkQZbe4fyQ:wKBmZGqqvgyhy1QRZaum1HBY2uKVDf

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks