General

  • Target

    9e30a37757dd67e6787f3c58149f183a1ccd0227d2e733d38615dab0f6712251

  • Size

    451KB

  • Sample

    221127-xjq1qaah57

  • MD5

    1b260dc5ee8e0570f45352803a3ff9ee

  • SHA1

    89b754505637bbf2cb7a809d7fc0fc1a28b504aa

  • SHA256

    9e30a37757dd67e6787f3c58149f183a1ccd0227d2e733d38615dab0f6712251

  • SHA512

    0282e3b43dd0c85cfae0411527b85b60177597fd88d9ba74f7c9b38e23c83e0f5c77be86da40b6d4c9dd23dedbf48646915b94cc3d2250ef0c9bc296550693bb

  • SSDEEP

    1536:Iy6XuxjNmK9JdqZESaGxPiQYTtjuzZ2bH1cwLCMj1Kpnouy8:Z6ebd0ESaU6XT8zZStCL5out

Malware Config

Targets

    • Target

      9e30a37757dd67e6787f3c58149f183a1ccd0227d2e733d38615dab0f6712251

    • Size

      451KB

    • MD5

      1b260dc5ee8e0570f45352803a3ff9ee

    • SHA1

      89b754505637bbf2cb7a809d7fc0fc1a28b504aa

    • SHA256

      9e30a37757dd67e6787f3c58149f183a1ccd0227d2e733d38615dab0f6712251

    • SHA512

      0282e3b43dd0c85cfae0411527b85b60177597fd88d9ba74f7c9b38e23c83e0f5c77be86da40b6d4c9dd23dedbf48646915b94cc3d2250ef0c9bc296550693bb

    • SSDEEP

      1536:Iy6XuxjNmK9JdqZESaGxPiQYTtjuzZ2bH1cwLCMj1Kpnouy8:Z6ebd0ESaU6XT8zZStCL5out

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks