General

  • Target

    e15a679241dc86c16cede7dddc2758bfd63c2e56dcba064c100b3d637d03cc8f

  • Size

    240KB

  • Sample

    221204-q769aaec82

  • MD5

    272a2d647b84469483d1d2b8941de360

  • SHA1

    3da05a955f9380e20580efca477b61e6b6a958ad

  • SHA256

    e15a679241dc86c16cede7dddc2758bfd63c2e56dcba064c100b3d637d03cc8f

  • SHA512

    9cca79a344df1ffe826ca88f29a25719822e2c85ef0d60a7ef9713d965bbfd9d77838dafdf72ce2f1ebc00e1da513e28d7ec2574644b0bad47c54773c864c38d

  • SSDEEP

    1536:YKNLWlngkYFKynXvAh1MFOMLwOueYdqXhVBZXcMik421dNSkWNVYM3O3:YaQgk6Kyn/wMFOMLN9AQdjWzT+

Malware Config

Targets

    • Target

      e15a679241dc86c16cede7dddc2758bfd63c2e56dcba064c100b3d637d03cc8f

    • Size

      240KB

    • MD5

      272a2d647b84469483d1d2b8941de360

    • SHA1

      3da05a955f9380e20580efca477b61e6b6a958ad

    • SHA256

      e15a679241dc86c16cede7dddc2758bfd63c2e56dcba064c100b3d637d03cc8f

    • SHA512

      9cca79a344df1ffe826ca88f29a25719822e2c85ef0d60a7ef9713d965bbfd9d77838dafdf72ce2f1ebc00e1da513e28d7ec2574644b0bad47c54773c864c38d

    • SSDEEP

      1536:YKNLWlngkYFKynXvAh1MFOMLwOueYdqXhVBZXcMik421dNSkWNVYM3O3:YaQgk6Kyn/wMFOMLN9AQdjWzT+

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks