General

  • Target

    file.exe

  • Size

    7.3MB

  • Sample

    230109-2bcwcabe21

  • MD5

    de9c17de70d95c84444b0065f28c3846

  • SHA1

    aca26605ebe629962a42aeaae5fb9f3e456d5a94

  • SHA256

    c501c38cdcc1018ec60c9f79e21f5a6bac2a735aec14f1f08315f10599004948

  • SHA512

    8deaea1c564a388451b3bdb0e8777ecd5f4aa6cc8013e6b79bc7e461ec71f74d52ddda3737d27a43825488f466f78bbda4a63386159ce0696afa66824d7b983e

  • SSDEEP

    196608:91OW7D2FyKxQbvhDvQzijAVOesB/U9PnT0VdGx4AEHqHMzEn:3OW2yKxARjdNU9yGxgiVn

Malware Config

Targets

    • Target

      file.exe

    • Size

      7.3MB

    • MD5

      de9c17de70d95c84444b0065f28c3846

    • SHA1

      aca26605ebe629962a42aeaae5fb9f3e456d5a94

    • SHA256

      c501c38cdcc1018ec60c9f79e21f5a6bac2a735aec14f1f08315f10599004948

    • SHA512

      8deaea1c564a388451b3bdb0e8777ecd5f4aa6cc8013e6b79bc7e461ec71f74d52ddda3737d27a43825488f466f78bbda4a63386159ce0696afa66824d7b983e

    • SSDEEP

      196608:91OW7D2FyKxQbvhDvQzijAVOesB/U9PnT0VdGx4AEHqHMzEn:3OW2yKxARjdNU9yGxgiVn

    • Modifies Windows Defender Real-time Protection settings

    • Windows security bypass

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks