General

  • Target

    f8b7eafb707cf2abe605979a4e515a6d3da1e31276c76c16df4177fa7f44e8ab

  • Size

    292KB

  • Sample

    221203-c436kagd23

  • MD5

    7e7b165e41d6d02a5fb98014f540a00f

  • SHA1

    84ea77dcf260f7af084be796ef8d0c635ea7d9e6

  • SHA256

    f8b7eafb707cf2abe605979a4e515a6d3da1e31276c76c16df4177fa7f44e8ab

  • SHA512

    5adcc84e3e25c4091fa8fd9017dfb6ca1d2fa1028d156c47ae8ba32a88c4737c14f096ce6246ed6aed29171b9c44ee7ff83d3fe3ee8a48386de4cd506c5086c4

  • SSDEEP

    3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH

Malware Config

Targets

    • Target

      f8b7eafb707cf2abe605979a4e515a6d3da1e31276c76c16df4177fa7f44e8ab

    • Size

      292KB

    • MD5

      7e7b165e41d6d02a5fb98014f540a00f

    • SHA1

      84ea77dcf260f7af084be796ef8d0c635ea7d9e6

    • SHA256

      f8b7eafb707cf2abe605979a4e515a6d3da1e31276c76c16df4177fa7f44e8ab

    • SHA512

      5adcc84e3e25c4091fa8fd9017dfb6ca1d2fa1028d156c47ae8ba32a88c4737c14f096ce6246ed6aed29171b9c44ee7ff83d3fe3ee8a48386de4cd506c5086c4

    • SSDEEP

      3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks