General

  • Target

    47b6246e5087c51145ea7fd05b8ee8ba05f0b668d4f5a514fecbe46142d64df9

  • Size

    1.3MB

  • Sample

    221127-xzmy1aga5v

  • MD5

    b6450b36282b5589ad45736b72b5d71c

  • SHA1

    c1a5e775670e6c0350b2136ff89b6140c2dc8815

  • SHA256

    47b6246e5087c51145ea7fd05b8ee8ba05f0b668d4f5a514fecbe46142d64df9

  • SHA512

    40a545d04e20e861255c0cf4035fdc149a255119b7e9e632bce030781a8800fc1bad505646c1b53e410c5f0328b9adcccd96f51627eb736ce12012c6bd088cd2

  • SSDEEP

    3072:1+kZqVeInSk82TfatZ9mD5fvNj6kECsjZ:1jaSk8iCtPmD5Hl6ysN

Malware Config

Targets

    • Target

      47b6246e5087c51145ea7fd05b8ee8ba05f0b668d4f5a514fecbe46142d64df9

    • Size

      1.3MB

    • MD5

      b6450b36282b5589ad45736b72b5d71c

    • SHA1

      c1a5e775670e6c0350b2136ff89b6140c2dc8815

    • SHA256

      47b6246e5087c51145ea7fd05b8ee8ba05f0b668d4f5a514fecbe46142d64df9

    • SHA512

      40a545d04e20e861255c0cf4035fdc149a255119b7e9e632bce030781a8800fc1bad505646c1b53e410c5f0328b9adcccd96f51627eb736ce12012c6bd088cd2

    • SSDEEP

      3072:1+kZqVeInSk82TfatZ9mD5fvNj6kECsjZ:1jaSk8iCtPmD5Hl6ysN

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks