General

  • Target

    63a0605cec89b1001e6711935a70376e3d6f91030a534e91cf8662a2d28287c6

  • Size

    255KB

  • Sample

    221127-xvx86sbh34

  • MD5

    9c896d9c7f30005370a5746fbc52ee31

  • SHA1

    05fb047ba4689ab1e16975963c71c65e99e61a3d

  • SHA256

    63a0605cec89b1001e6711935a70376e3d6f91030a534e91cf8662a2d28287c6

  • SHA512

    37e7145e4684618af5cfb970fc15f96eb198ea74a5fe1a7bdb8ef23f3c8585296c52d551a7361121144818f9dd804e8619d94c7630925b6e66110bbe3c77e6c5

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJV:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI+

Malware Config

Targets

    • Target

      63a0605cec89b1001e6711935a70376e3d6f91030a534e91cf8662a2d28287c6

    • Size

      255KB

    • MD5

      9c896d9c7f30005370a5746fbc52ee31

    • SHA1

      05fb047ba4689ab1e16975963c71c65e99e61a3d

    • SHA256

      63a0605cec89b1001e6711935a70376e3d6f91030a534e91cf8662a2d28287c6

    • SHA512

      37e7145e4684618af5cfb970fc15f96eb198ea74a5fe1a7bdb8ef23f3c8585296c52d551a7361121144818f9dd804e8619d94c7630925b6e66110bbe3c77e6c5

    • SSDEEP

      3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJV:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI+

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks