General

  • Target

    dd1a350da8228664bc76f3efee4cca97c4236ed6000f79179dedd524b9f2c37f

  • Size

    255KB

  • Sample

    221127-xr2gesbf23

  • MD5

    d3fdaf5a4daec0d7a3a7f1c6594a526e

  • SHA1

    cff0b7b0b7eba2f249828fa99e8d87a2163e67ed

  • SHA256

    dd1a350da8228664bc76f3efee4cca97c4236ed6000f79179dedd524b9f2c37f

  • SHA512

    e60560268ec55337ed71a549847b828cf426cdec578f56b8d90b3433eedd3cebb5b58e9e9f925b7c7dad0421a63b35fe07b6ac48de69ae8cfc3e31ad03efd9a8

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJR:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIg

Malware Config

Targets

    • Target

      dd1a350da8228664bc76f3efee4cca97c4236ed6000f79179dedd524b9f2c37f

    • Size

      255KB

    • MD5

      d3fdaf5a4daec0d7a3a7f1c6594a526e

    • SHA1

      cff0b7b0b7eba2f249828fa99e8d87a2163e67ed

    • SHA256

      dd1a350da8228664bc76f3efee4cca97c4236ed6000f79179dedd524b9f2c37f

    • SHA512

      e60560268ec55337ed71a549847b828cf426cdec578f56b8d90b3433eedd3cebb5b58e9e9f925b7c7dad0421a63b35fe07b6ac48de69ae8cfc3e31ad03efd9a8

    • SSDEEP

      3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJR:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIg

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks