General

  • Target

    b218041ae37bb4f37715722d97a5d7b7b6fa7de3bcffb0b2ccbdeb5b93bbf183

  • Size

    1.2MB

  • Sample

    221202-w83v5sce46

  • MD5

    03bb57c0b709f25040a1b9251aadb7eb

  • SHA1

    3927c036a94e084eb629c196492565cd4db53eba

  • SHA256

    b218041ae37bb4f37715722d97a5d7b7b6fa7de3bcffb0b2ccbdeb5b93bbf183

  • SHA512

    6b7b3d3c41825a46e931f209afe126b35c982ddc840caeca7597c32736bf4fc4dacbe447f6982654b0e922ce3db63422d0d44d0eee728cdf92a17ec737d5c170

  • SSDEEP

    3072:qXJCFRSt63wPwWYhVTjJ5cHymR7w0YmS8O:LdnWYD95z4w0Dt

Malware Config

Targets

    • Target

      b218041ae37bb4f37715722d97a5d7b7b6fa7de3bcffb0b2ccbdeb5b93bbf183

    • Size

      1.2MB

    • MD5

      03bb57c0b709f25040a1b9251aadb7eb

    • SHA1

      3927c036a94e084eb629c196492565cd4db53eba

    • SHA256

      b218041ae37bb4f37715722d97a5d7b7b6fa7de3bcffb0b2ccbdeb5b93bbf183

    • SHA512

      6b7b3d3c41825a46e931f209afe126b35c982ddc840caeca7597c32736bf4fc4dacbe447f6982654b0e922ce3db63422d0d44d0eee728cdf92a17ec737d5c170

    • SSDEEP

      3072:qXJCFRSt63wPwWYhVTjJ5cHymR7w0YmS8O:LdnWYD95z4w0Dt

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks