General

  • Target

    c9c15da9057c43db38345260a0cfec53542c3be0d23a1f86289e7bb5bc9eaeca

  • Size

    474KB

  • Sample

    221203-16vtzaac56

  • MD5

    232370e55a8931263c031a83907f5700

  • SHA1

    e8a7c73a8b0b7659fff781907e8ba28f30401f9b

  • SHA256

    c9c15da9057c43db38345260a0cfec53542c3be0d23a1f86289e7bb5bc9eaeca

  • SHA512

    8bc21b25558a940a881907a3b866b58c21962d334a8d95a64196e7341fb77b30570ba875231be56dd3d1bec948e94f062208946925d24345ca1301a849752e29

  • SSDEEP

    1536:Bq7AWlngkYFKynXvAh1MFOMLwOueYdqXhVBZXcMik421dNSkWNVYM3O3:BvQgk6Kyn/wMFOMLN9AQdjWzT+

Malware Config

Targets

    • Target

      c9c15da9057c43db38345260a0cfec53542c3be0d23a1f86289e7bb5bc9eaeca

    • Size

      474KB

    • MD5

      232370e55a8931263c031a83907f5700

    • SHA1

      e8a7c73a8b0b7659fff781907e8ba28f30401f9b

    • SHA256

      c9c15da9057c43db38345260a0cfec53542c3be0d23a1f86289e7bb5bc9eaeca

    • SHA512

      8bc21b25558a940a881907a3b866b58c21962d334a8d95a64196e7341fb77b30570ba875231be56dd3d1bec948e94f062208946925d24345ca1301a849752e29

    • SSDEEP

      1536:Bq7AWlngkYFKynXvAh1MFOMLwOueYdqXhVBZXcMik421dNSkWNVYM3O3:BvQgk6Kyn/wMFOMLN9AQdjWzT+

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks