General

  • Target

    b78cceef431522bf8600675a1f88d190f000cb338fca21c9853bc0f063f52ea5

  • Size

    798KB

  • Sample

    221203-rzthwshe75

  • MD5

    843c8981bbd00bc2583f9d1281cd2ba1

  • SHA1

    c220ee297ad4e0e67bc5ad20534b031322fa3b42

  • SHA256

    b78cceef431522bf8600675a1f88d190f000cb338fca21c9853bc0f063f52ea5

  • SHA512

    907c7cc8ffdda6f0c3ccb1dfe2d0ffc1304097934b1efb8af7ee19742d3d61382757c8640aafdbaaa4834efb83fda7e1097cdecbe68822062573f0f4eae289de

  • SSDEEP

    3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH

Malware Config

Targets

    • Target

      b78cceef431522bf8600675a1f88d190f000cb338fca21c9853bc0f063f52ea5

    • Size

      798KB

    • MD5

      843c8981bbd00bc2583f9d1281cd2ba1

    • SHA1

      c220ee297ad4e0e67bc5ad20534b031322fa3b42

    • SHA256

      b78cceef431522bf8600675a1f88d190f000cb338fca21c9853bc0f063f52ea5

    • SHA512

      907c7cc8ffdda6f0c3ccb1dfe2d0ffc1304097934b1efb8af7ee19742d3d61382757c8640aafdbaaa4834efb83fda7e1097cdecbe68822062573f0f4eae289de

    • SSDEEP

      3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks