General

  • Target

    a1eaa65ade8944f29d274e2c585ab3270d6d43df35e891ad2f6eed385d3b08b4

  • Size

    3.4MB

  • Sample

    221203-c92jxsbh5s

  • MD5

    837ee9eb5356c7a0eb72f2b989a4fcdd

  • SHA1

    7fc7abb22f2c604fde78343702c70042d7a13ac4

  • SHA256

    a1eaa65ade8944f29d274e2c585ab3270d6d43df35e891ad2f6eed385d3b08b4

  • SHA512

    adda11bb8719427c47c099588df688dc977221e67b3d56f04ca5c5b91f1bb55dcf2eab23daf9cb4c0a70ae41f519e8ed366d4409da4a6cc2cf629deb9b74a024

  • SSDEEP

    1536:+EfFNvtgmAl7z5dKY6yuJPW8K43w9NXOM1aRl/i6JWT0S9yXnBibnouy8:+YLmGO4W849NXO9RlK6gOxiDout

Malware Config

Targets

    • Target

      a1eaa65ade8944f29d274e2c585ab3270d6d43df35e891ad2f6eed385d3b08b4

    • Size

      3.4MB

    • MD5

      837ee9eb5356c7a0eb72f2b989a4fcdd

    • SHA1

      7fc7abb22f2c604fde78343702c70042d7a13ac4

    • SHA256

      a1eaa65ade8944f29d274e2c585ab3270d6d43df35e891ad2f6eed385d3b08b4

    • SHA512

      adda11bb8719427c47c099588df688dc977221e67b3d56f04ca5c5b91f1bb55dcf2eab23daf9cb4c0a70ae41f519e8ed366d4409da4a6cc2cf629deb9b74a024

    • SSDEEP

      1536:+EfFNvtgmAl7z5dKY6yuJPW8K43w9NXOM1aRl/i6JWT0S9yXnBibnouy8:+YLmGO4W849NXO9RlK6gOxiDout

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks