General

  • Target

    d91d6c74d354857642493e7110a027a442ad3af7a258174d76851dd1474e3739

  • Size

    848KB

  • Sample

    221202-w58xzscc26

  • MD5

    f9c7e26ef27c5ee51e323bf44fbb55da

  • SHA1

    38893810448f1383dd44350c4c90d7fc72249680

  • SHA256

    d91d6c74d354857642493e7110a027a442ad3af7a258174d76851dd1474e3739

  • SHA512

    763638f935321c29cb627a8c600c6586e6dafc5018ac369b850c3c7b2087baf1c6e1a4bc2b69cad15646e916da5cb2b4f0f0f884e92d07e985bc08ac2be86854

  • SSDEEP

    1536:7Eo6GzI9cono/es2KyvLh423iZB7LbGnkBwUDXLY+cnCd4SztNXjU8UdatVgc1h:g8ciono/e95vLh4j2Umns4khjU0jZ

Malware Config

Targets

    • Target

      d91d6c74d354857642493e7110a027a442ad3af7a258174d76851dd1474e3739

    • Size

      848KB

    • MD5

      f9c7e26ef27c5ee51e323bf44fbb55da

    • SHA1

      38893810448f1383dd44350c4c90d7fc72249680

    • SHA256

      d91d6c74d354857642493e7110a027a442ad3af7a258174d76851dd1474e3739

    • SHA512

      763638f935321c29cb627a8c600c6586e6dafc5018ac369b850c3c7b2087baf1c6e1a4bc2b69cad15646e916da5cb2b4f0f0f884e92d07e985bc08ac2be86854

    • SSDEEP

      1536:7Eo6GzI9cono/es2KyvLh423iZB7LbGnkBwUDXLY+cnCd4SztNXjU8UdatVgc1h:g8ciono/e95vLh4j2Umns4khjU0jZ

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks