General

  • Target

    file.exe

  • Size

    7.2MB

  • Sample

    230205-f25hdsbf4w

  • MD5

    400f4ae375aafcece26480463726564d

  • SHA1

    c50b724455abbcaad48ef7a946f74f6f9a564fcb

  • SHA256

    ad4fd96c0caa4ecc9086d82f1e7ce79fe27735d14a440b4303010e419c99d91e

  • SHA512

    c8c7837556196bc49b892234047341e0e5ab0dacb41d72a497aadd20eed2278e41b8d7bd031599930f0a7967deddcebd1ee2322c2cbaf92085a37a8b8e622b4f

  • SSDEEP

    196608:91ODEVXeHxHDzTlQFvq8pwbi2KqSp9osLej5OgG+ejdx:3O4VuH5liHH8CDSO/

Malware Config

Targets

    • Target

      file.exe

    • Size

      7.2MB

    • MD5

      400f4ae375aafcece26480463726564d

    • SHA1

      c50b724455abbcaad48ef7a946f74f6f9a564fcb

    • SHA256

      ad4fd96c0caa4ecc9086d82f1e7ce79fe27735d14a440b4303010e419c99d91e

    • SHA512

      c8c7837556196bc49b892234047341e0e5ab0dacb41d72a497aadd20eed2278e41b8d7bd031599930f0a7967deddcebd1ee2322c2cbaf92085a37a8b8e622b4f

    • SSDEEP

      196608:91ODEVXeHxHDzTlQFvq8pwbi2KqSp9osLej5OgG+ejdx:3O4VuH5liHH8CDSO/

    • Modifies Windows Defender Real-time Protection settings

    • Windows security bypass

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks