General

  • Target

    c270160d8254b84bd6764c519dab824090f54cd29c69fa68f097f20278f846cb

  • Size

    1.2MB

  • Sample

    221126-17wgwsch6y

  • MD5

    c1dcd7f3def2daf60560daa4409a2621

  • SHA1

    feed6679381752d1a9857877a057470c35eba4ea

  • SHA256

    c270160d8254b84bd6764c519dab824090f54cd29c69fa68f097f20278f846cb

  • SHA512

    66eaa2fa4bf3271584bb8ee22d1f04ca0c1653b0b3d42f922f1fcebdca2614879f8294e8d42083fc857c7ea7284a129f5049bd4f66a242ce5979b28770fd7f84

  • SSDEEP

    3072:OwHl/Gnrl2wGELlyzXq4D2N3v5FQLffCv7oVJNpUpnrT8vp:tB4rlryzIFQLfqvsPfSUv

Malware Config

Targets

    • Target

      c270160d8254b84bd6764c519dab824090f54cd29c69fa68f097f20278f846cb

    • Size

      1.2MB

    • MD5

      c1dcd7f3def2daf60560daa4409a2621

    • SHA1

      feed6679381752d1a9857877a057470c35eba4ea

    • SHA256

      c270160d8254b84bd6764c519dab824090f54cd29c69fa68f097f20278f846cb

    • SHA512

      66eaa2fa4bf3271584bb8ee22d1f04ca0c1653b0b3d42f922f1fcebdca2614879f8294e8d42083fc857c7ea7284a129f5049bd4f66a242ce5979b28770fd7f84

    • SSDEEP

      3072:OwHl/Gnrl2wGELlyzXq4D2N3v5FQLffCv7oVJNpUpnrT8vp:tB4rlryzIFQLfqvsPfSUv

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks