General

  • Target

    f2379aabaa8d5909ba7c89953ddf701c346dee31adb29c962198e5cf376a3a90

  • Size

    1.1MB

  • Sample

    221126-z7helaaa9w

  • MD5

    b87c0de9804e714ff7dedc66d9fcb044

  • SHA1

    560e055432b2efd5cec1639e4cf7b05149f8d90c

  • SHA256

    f2379aabaa8d5909ba7c89953ddf701c346dee31adb29c962198e5cf376a3a90

  • SHA512

    57d7058cd8d576f6ad3251ff8b1d9ce8d3fbac68efd4ca7a0e0cadd30848fc87e6f57f62e8cce9b39df80a28d702e00a6a3ba7bcd1db77a9ff1d14ee042d90ef

  • SSDEEP

    24576:8gUCLpFE5XT37g5lNFhNsdvQ4Ri1v8SI+y8HTYa:8GjQwfNFhNsdYX8SI+vY

Malware Config

Targets

    • Target

      f2379aabaa8d5909ba7c89953ddf701c346dee31adb29c962198e5cf376a3a90

    • Size

      1.1MB

    • MD5

      b87c0de9804e714ff7dedc66d9fcb044

    • SHA1

      560e055432b2efd5cec1639e4cf7b05149f8d90c

    • SHA256

      f2379aabaa8d5909ba7c89953ddf701c346dee31adb29c962198e5cf376a3a90

    • SHA512

      57d7058cd8d576f6ad3251ff8b1d9ce8d3fbac68efd4ca7a0e0cadd30848fc87e6f57f62e8cce9b39df80a28d702e00a6a3ba7bcd1db77a9ff1d14ee042d90ef

    • SSDEEP

      24576:8gUCLpFE5XT37g5lNFhNsdvQ4Ri1v8SI+y8HTYa:8GjQwfNFhNsdYX8SI+vY

    • UAC bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Tasks