General

  • Target

    c1fadf15b0d2d7b645aac86ce20b073f00b02f736546d5c876af0d3860a1d586

  • Size

    1.4MB

  • Sample

    221203-c1d29sba4y

  • MD5

    b5e515b6592f2a2ac6e8c6ba2763e1fe

  • SHA1

    66affadb09138db66434c660c47f4c28d7ded2c0

  • SHA256

    c1fadf15b0d2d7b645aac86ce20b073f00b02f736546d5c876af0d3860a1d586

  • SHA512

    d92c0a05d79599c1f6a41eb4322356df258846fd052daea0011f55056533fa8ad6a45288d24991cc889a945f80e5ad2f16edba84d1aeea02d4e6e235eb1923e4

  • SSDEEP

    1536:7I17SYMoQEeZ3tmnunbHq7eOHc3Hbuk93VMjBmGQSbcW+gZ372Fc0h:i4otehtmnuLqdHguq3pGz4W+g

Malware Config

Targets

    • Target

      c1fadf15b0d2d7b645aac86ce20b073f00b02f736546d5c876af0d3860a1d586

    • Size

      1.4MB

    • MD5

      b5e515b6592f2a2ac6e8c6ba2763e1fe

    • SHA1

      66affadb09138db66434c660c47f4c28d7ded2c0

    • SHA256

      c1fadf15b0d2d7b645aac86ce20b073f00b02f736546d5c876af0d3860a1d586

    • SHA512

      d92c0a05d79599c1f6a41eb4322356df258846fd052daea0011f55056533fa8ad6a45288d24991cc889a945f80e5ad2f16edba84d1aeea02d4e6e235eb1923e4

    • SSDEEP

      1536:7I17SYMoQEeZ3tmnunbHq7eOHc3Hbuk93VMjBmGQSbcW+gZ372Fc0h:i4otehtmnuLqdHguq3pGz4W+g

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks