General

  • Target

    a9cd6345e1614b725e6f080ccec259d8b67c8508391318dadbba921c987927cd

  • Size

    299KB

  • Sample

    221202-w6f9csfh3y

  • MD5

    b0513be631c63d289e12ca35c60988d8

  • SHA1

    39fa87d51b9253212c8df411f57df3280d1def81

  • SHA256

    a9cd6345e1614b725e6f080ccec259d8b67c8508391318dadbba921c987927cd

  • SHA512

    95807e3cbd4bfb5ef8d4b2f4ec874d811675c192adadf4308ba415be9b64b627bd71cea8ddfa2e186fca259bac2eb6ad8454c606b219db9c757cffc225384630

  • SSDEEP

    1536:7ws+Dd8oVCTSzQHhn0lIF2rX2OKvQ4m6OXHGvA3D0FsBRyBYOKG0Ph:8ZCoaSzQB0iiaSvTyCRy+4

Malware Config

Targets

    • Target

      a9cd6345e1614b725e6f080ccec259d8b67c8508391318dadbba921c987927cd

    • Size

      299KB

    • MD5

      b0513be631c63d289e12ca35c60988d8

    • SHA1

      39fa87d51b9253212c8df411f57df3280d1def81

    • SHA256

      a9cd6345e1614b725e6f080ccec259d8b67c8508391318dadbba921c987927cd

    • SHA512

      95807e3cbd4bfb5ef8d4b2f4ec874d811675c192adadf4308ba415be9b64b627bd71cea8ddfa2e186fca259bac2eb6ad8454c606b219db9c757cffc225384630

    • SSDEEP

      1536:7ws+Dd8oVCTSzQHhn0lIF2rX2OKvQ4m6OXHGvA3D0FsBRyBYOKG0Ph:8ZCoaSzQB0iiaSvTyCRy+4

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks