General

  • Target

    832844688a4199bfff145ec64d59492a72772d1ea254a913d9a4d38d438d04bd

  • Size

    1.2MB

  • Sample

    221125-jdylqabc27

  • MD5

    f1d484afa90b50c5a5d4552d87a4ea1a

  • SHA1

    c0f7cbec80db02dc08395f072b07bdcd9e29d7b4

  • SHA256

    832844688a4199bfff145ec64d59492a72772d1ea254a913d9a4d38d438d04bd

  • SHA512

    24fab820edf076b75fab614edc190ada27ebd4487974b49bf2d309e6e5c0034a34b373beb6fbeb25ccbf65899c0a60b9d6b328ff731837ee38af3a63e11b7516

  • SSDEEP

    3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH

Malware Config

Targets

    • Target

      832844688a4199bfff145ec64d59492a72772d1ea254a913d9a4d38d438d04bd

    • Size

      1.2MB

    • MD5

      f1d484afa90b50c5a5d4552d87a4ea1a

    • SHA1

      c0f7cbec80db02dc08395f072b07bdcd9e29d7b4

    • SHA256

      832844688a4199bfff145ec64d59492a72772d1ea254a913d9a4d38d438d04bd

    • SHA512

      24fab820edf076b75fab614edc190ada27ebd4487974b49bf2d309e6e5c0034a34b373beb6fbeb25ccbf65899c0a60b9d6b328ff731837ee38af3a63e11b7516

    • SSDEEP

      3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks