General

  • Target

    57c569cc22076e2e730be6747fa2cbb76d6c55ddeca0cd738b87c641618706a9

  • Size

    1.1MB

  • Sample

    221202-w8z49agb2s

  • MD5

    8ec895e99f094762d7b68c11105304fa

  • SHA1

    d77e5438164554cf17d3317bd0d39f0fede06518

  • SHA256

    57c569cc22076e2e730be6747fa2cbb76d6c55ddeca0cd738b87c641618706a9

  • SHA512

    134b21ae789861990a26cf825acecf944ae51349a4fb56d1d8ebe5ff796a1395e1f725e7a385902f799dedb11b063f951362f586b29b9224d8107f562b1f8435

  • SSDEEP

    3072:caIuLuxCI5Q2JPnL6gxEMd3h/bUgOBnlD:/tIK2JPL6g5Rjpsh

Malware Config

Targets

    • Target

      57c569cc22076e2e730be6747fa2cbb76d6c55ddeca0cd738b87c641618706a9

    • Size

      1.1MB

    • MD5

      8ec895e99f094762d7b68c11105304fa

    • SHA1

      d77e5438164554cf17d3317bd0d39f0fede06518

    • SHA256

      57c569cc22076e2e730be6747fa2cbb76d6c55ddeca0cd738b87c641618706a9

    • SHA512

      134b21ae789861990a26cf825acecf944ae51349a4fb56d1d8ebe5ff796a1395e1f725e7a385902f799dedb11b063f951362f586b29b9224d8107f562b1f8435

    • SSDEEP

      3072:caIuLuxCI5Q2JPnL6gxEMd3h/bUgOBnlD:/tIK2JPL6g5Rjpsh

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks