General

  • Target

    1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

  • Size

    2.0MB

  • Sample

    221231-xe4e9ade21

  • MD5

    53ca26fbcd0c54a9529dde33d5bc2042

  • SHA1

    20fd30d5957986143fca7488762e23f97f85d28a

  • SHA256

    1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

  • SHA512

    da4275c57f04fbcf3811336a46396ab754a3df91ea25a5ba3d89bf7499cfe700b65ec66ba4a8e4d374283a641e3e0e70aaf2337520e6c56b300693696b2442f6

  • SSDEEP

    24576:kxm0iO/DQ3eyqvtsJe30RxVIxplYJ1B3J7hoBTl+mRezac3hWYo7wszC9BPnfCvJ:kA0T/kwKQ0nVe+JGR0nBinx

Malware Config

Targets

    • Target

      1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

    • Size

      2.0MB

    • MD5

      53ca26fbcd0c54a9529dde33d5bc2042

    • SHA1

      20fd30d5957986143fca7488762e23f97f85d28a

    • SHA256

      1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

    • SHA512

      da4275c57f04fbcf3811336a46396ab754a3df91ea25a5ba3d89bf7499cfe700b65ec66ba4a8e4d374283a641e3e0e70aaf2337520e6c56b300693696b2442f6

    • SSDEEP

      24576:kxm0iO/DQ3eyqvtsJe30RxVIxplYJ1B3J7hoBTl+mRezac3hWYo7wszC9BPnfCvJ:kA0T/kwKQ0nVe+JGR0nBinx

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks