General

  • Target

    57b3e605df071f933ca53b5e7ce313817a2da9eec938cb1e9d05a7615fbaa8ff

  • Size

    1.8MB

  • Sample

    221206-2wdclsca32

  • MD5

    f24e0271cebcf8e9e11b6e127a3cbb25

  • SHA1

    bf91d43bf8f809c92ba3330dda5400c9f09d57a4

  • SHA256

    57b3e605df071f933ca53b5e7ce313817a2da9eec938cb1e9d05a7615fbaa8ff

  • SHA512

    132ac4f1a4573c4542492af256a6cc704978365f27cc59dfa1f3cfe3c2ca6cde80273cf24df04ba5ab8c97178f0d95adf3ed39c6234d3e8d4c7607640e41dc90

  • SSDEEP

    24576:+ZqLaF4PGweLA+tyIGA8ZpEaEVvPCdYf36OD5hy83CR0G26S+S4OUC9QqMG3O:kqLay+weLA9uLVvH/5Ed6P+lxld

Malware Config

Targets

    • Target

      57b3e605df071f933ca53b5e7ce313817a2da9eec938cb1e9d05a7615fbaa8ff

    • Size

      1.8MB

    • MD5

      f24e0271cebcf8e9e11b6e127a3cbb25

    • SHA1

      bf91d43bf8f809c92ba3330dda5400c9f09d57a4

    • SHA256

      57b3e605df071f933ca53b5e7ce313817a2da9eec938cb1e9d05a7615fbaa8ff

    • SHA512

      132ac4f1a4573c4542492af256a6cc704978365f27cc59dfa1f3cfe3c2ca6cde80273cf24df04ba5ab8c97178f0d95adf3ed39c6234d3e8d4c7607640e41dc90

    • SSDEEP

      24576:+ZqLaF4PGweLA+tyIGA8ZpEaEVvPCdYf36OD5hy83CR0G26S+S4OUC9QqMG3O:kqLay+weLA9uLVvH/5Ed6P+lxld

    • Modifies system executable filetype association

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Registers COM server for autorun

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks