General

  • Target

    9ab0c0f5ed5a9a457a82b6d055b7d21210c8e9c4dadc2bf73d8dd434b41cc492

  • Size

    796KB

  • Sample

    221129-rvfq8sgh47

  • MD5

    eb60c70a19536f048bab556adaffb1b4

  • SHA1

    477390ac5533a0f1bde2526ef923235dff111ebc

  • SHA256

    9ab0c0f5ed5a9a457a82b6d055b7d21210c8e9c4dadc2bf73d8dd434b41cc492

  • SHA512

    93bd91ca1aee85c50b18c2e84583aa69649782f9ba3cda44336b05e437a9b6a39c79a5e766030cb52462c17c601e710eedbce8f851a839de268710870cba7025

  • SSDEEP

    1536:LbnRuEbswtfKxehJN/Ba6gZblpuiv0SvaxyXaCbZZC4+06gjIrCTRknanwujxsfS:LbnRuEYcg+mliy5bdH6MI2TqnOY

Malware Config

Targets

    • Target

      9ab0c0f5ed5a9a457a82b6d055b7d21210c8e9c4dadc2bf73d8dd434b41cc492

    • Size

      796KB

    • MD5

      eb60c70a19536f048bab556adaffb1b4

    • SHA1

      477390ac5533a0f1bde2526ef923235dff111ebc

    • SHA256

      9ab0c0f5ed5a9a457a82b6d055b7d21210c8e9c4dadc2bf73d8dd434b41cc492

    • SHA512

      93bd91ca1aee85c50b18c2e84583aa69649782f9ba3cda44336b05e437a9b6a39c79a5e766030cb52462c17c601e710eedbce8f851a839de268710870cba7025

    • SSDEEP

      1536:LbnRuEbswtfKxehJN/Ba6gZblpuiv0SvaxyXaCbZZC4+06gjIrCTRknanwujxsfS:LbnRuEYcg+mliy5bdH6MI2TqnOY

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks