General

  • Target

    file.exe

  • Size

    7.2MB

  • Sample

    221124-pav93sce56

  • MD5

    080767677c91ff72a19363f71a1d14a3

  • SHA1

    c1ce95aba4f5ab985f439b5dc9890a40454cb61d

  • SHA256

    848b74b49d5770fc1d119aeb76786f887ffa8316fde006b0162e1040f3ec3fbd

  • SHA512

    0eecb34312884fbde607b1ef9d2dc0f85d978088184ed6f169114416ada1988205743556b84c0d1c9b472c1a5a3079e023b45fe247f8be3ea8118140d7555e97

  • SSDEEP

    196608:91Oicf3Qv9bnMYarNLZQcxZg+Utyrfc8Z5:3OicY+YOQcxSnsU05

Malware Config

Targets

    • Target

      file.exe

    • Size

      7.2MB

    • MD5

      080767677c91ff72a19363f71a1d14a3

    • SHA1

      c1ce95aba4f5ab985f439b5dc9890a40454cb61d

    • SHA256

      848b74b49d5770fc1d119aeb76786f887ffa8316fde006b0162e1040f3ec3fbd

    • SHA512

      0eecb34312884fbde607b1ef9d2dc0f85d978088184ed6f169114416ada1988205743556b84c0d1c9b472c1a5a3079e023b45fe247f8be3ea8118140d7555e97

    • SSDEEP

      196608:91Oicf3Qv9bnMYarNLZQcxZg+Utyrfc8Z5:3OicY+YOQcxSnsU05

    • Modifies Windows Defender Real-time Protection settings

    • Windows security bypass

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks