General

  • Target

    6351d591f86bbcd9ad40ecb04f3465b1c1b596af13217765750a97ae76c88537

  • Size

    2.4MB

  • Sample

    221206-t54l6ahb9z

  • MD5

    775093b88b7af664f938cce05a5310e2

  • SHA1

    108272b646817c2e34d8337a6d607551b3bab66d

  • SHA256

    6351d591f86bbcd9ad40ecb04f3465b1c1b596af13217765750a97ae76c88537

  • SHA512

    bfa501d497f9338bd14ea37e605425bfbf22649c1384e5170fdfeb438c057fc65151516713b6272821a1e05f1bac3ac2d740b653c72d7618e9f0f6e15d00b55f

  • SSDEEP

    3072:pT7gII4uL8ldMSU0Vvzt/uzhWtJaqejvc4RD:pT7XuLKdP8zhW7aqCrD

Malware Config

Targets

    • Target

      6351d591f86bbcd9ad40ecb04f3465b1c1b596af13217765750a97ae76c88537

    • Size

      2.4MB

    • MD5

      775093b88b7af664f938cce05a5310e2

    • SHA1

      108272b646817c2e34d8337a6d607551b3bab66d

    • SHA256

      6351d591f86bbcd9ad40ecb04f3465b1c1b596af13217765750a97ae76c88537

    • SHA512

      bfa501d497f9338bd14ea37e605425bfbf22649c1384e5170fdfeb438c057fc65151516713b6272821a1e05f1bac3ac2d740b653c72d7618e9f0f6e15d00b55f

    • SSDEEP

      3072:pT7gII4uL8ldMSU0Vvzt/uzhWtJaqejvc4RD:pT7XuLKdP8zhW7aqCrD

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks