General

  • Target

    149bf4e5aa3f19a56a3a7949a932ee27fcd81fd5656e90f8587349ca156da6f4

  • Size

    255KB

  • Sample

    221205-n62lasge67

  • MD5

    5b68d2c8161c922047f9294aa1737994

  • SHA1

    b9b92f6a127828bec57ef0acf253759abba3fbba

  • SHA256

    149bf4e5aa3f19a56a3a7949a932ee27fcd81fd5656e90f8587349ca156da6f4

  • SHA512

    9c294192a2d255013374432418d8d8cc7b01c9d89b318ff39e1bb4f9906bb58d59f23b42364e5af81a2130cb92b541e0888b4b4f2a46e1f59b62e3be1d96e4bd

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJp:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIa

Malware Config

Targets

    • Target

      149bf4e5aa3f19a56a3a7949a932ee27fcd81fd5656e90f8587349ca156da6f4

    • Size

      255KB

    • MD5

      5b68d2c8161c922047f9294aa1737994

    • SHA1

      b9b92f6a127828bec57ef0acf253759abba3fbba

    • SHA256

      149bf4e5aa3f19a56a3a7949a932ee27fcd81fd5656e90f8587349ca156da6f4

    • SHA512

      9c294192a2d255013374432418d8d8cc7b01c9d89b318ff39e1bb4f9906bb58d59f23b42364e5af81a2130cb92b541e0888b4b4f2a46e1f59b62e3be1d96e4bd

    • SSDEEP

      3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJp:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIa

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks