General

  • Target

    541a44696686f2441df5119a31e4960cb2c8673f604a8049bbc5b6fb8dfef4ce

  • Size

    255KB

  • Sample

    221124-qfxwjaad5w

  • MD5

    42c0d4a362c8bd067e13a3500ee2ca99

  • SHA1

    e1ba7e1f65ac7f7c859ee0b5d848b67819bafbcd

  • SHA256

    541a44696686f2441df5119a31e4960cb2c8673f604a8049bbc5b6fb8dfef4ce

  • SHA512

    41490ec5398e26ccba32798f3f6e7d48d56613e2210a4ec8cbe449d05d165f66dc85941eeb05651d7adf6d9a9a37f9a81ef79d75b95a4a4e31251d482d87e1cf

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJZ:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI6

Malware Config

Targets

    • Target

      541a44696686f2441df5119a31e4960cb2c8673f604a8049bbc5b6fb8dfef4ce

    • Size

      255KB

    • MD5

      42c0d4a362c8bd067e13a3500ee2ca99

    • SHA1

      e1ba7e1f65ac7f7c859ee0b5d848b67819bafbcd

    • SHA256

      541a44696686f2441df5119a31e4960cb2c8673f604a8049bbc5b6fb8dfef4ce

    • SHA512

      41490ec5398e26ccba32798f3f6e7d48d56613e2210a4ec8cbe449d05d165f66dc85941eeb05651d7adf6d9a9a37f9a81ef79d75b95a4a4e31251d482d87e1cf

    • SSDEEP

      3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJZ:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI6

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks