General

  • Target

    43caf47dee6b47013963daec44bcdfedb9ec84095e8f4ad21b0fe98f63bff072

  • Size

    458KB

  • Sample

    221124-lwkhxsaa3y

  • MD5

    ba8363ab2c535e6a3d6d5ee1822c70a6

  • SHA1

    d4dfbb4e1b80d2001bb25d2bdfda4f861270c5c4

  • SHA256

    43caf47dee6b47013963daec44bcdfedb9ec84095e8f4ad21b0fe98f63bff072

  • SHA512

    fd1ab0c17231ed53f1df2f06d7f80789ef1467d221d0fda9b3c21a9620ac055ef7858927cca32ad4b7c097b069b1869c8f3754c2d9c71621e6f49829909bf23a

  • SSDEEP

    1536:cd04boUzdIBsZUpUQSe1sjL/91IqmM4nouy8:cdJboUpEsueFssP11I5Mwout

Malware Config

Targets

    • Target

      43caf47dee6b47013963daec44bcdfedb9ec84095e8f4ad21b0fe98f63bff072

    • Size

      458KB

    • MD5

      ba8363ab2c535e6a3d6d5ee1822c70a6

    • SHA1

      d4dfbb4e1b80d2001bb25d2bdfda4f861270c5c4

    • SHA256

      43caf47dee6b47013963daec44bcdfedb9ec84095e8f4ad21b0fe98f63bff072

    • SHA512

      fd1ab0c17231ed53f1df2f06d7f80789ef1467d221d0fda9b3c21a9620ac055ef7858927cca32ad4b7c097b069b1869c8f3754c2d9c71621e6f49829909bf23a

    • SSDEEP

      1536:cd04boUzdIBsZUpUQSe1sjL/91IqmM4nouy8:cdJboUpEsueFssP11I5Mwout

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks