General

  • Target

    file.exe

  • Size

    7.3MB

  • Sample

    230206-3hpddsbe81

  • MD5

    2a394e4469901863d1e0ba494b73af77

  • SHA1

    7dca5a43f451705c80ca73aba9f97b21e1a78c6a

  • SHA256

    d423233f708e0af70448c973ff07ab25c072a1fe01006ea47ea664c3d371a3ed

  • SHA512

    a160fff21bc7faef45fa2185ed854e3223ba6232b01761815e7ab8c6775b77b84989799b6702f87ea21e3dd0ca811111a9963b177529d61131d9b392cbd0acd6

  • SSDEEP

    196608:91OIM6e41Qo8DYFol79VtoicAk9YuxSCS/pDF5YwERvq6:3Op141Qo2c+xVt9oY4/SP5YwCq6

Malware Config

Targets

    • Target

      file.exe

    • Size

      7.3MB

    • MD5

      2a394e4469901863d1e0ba494b73af77

    • SHA1

      7dca5a43f451705c80ca73aba9f97b21e1a78c6a

    • SHA256

      d423233f708e0af70448c973ff07ab25c072a1fe01006ea47ea664c3d371a3ed

    • SHA512

      a160fff21bc7faef45fa2185ed854e3223ba6232b01761815e7ab8c6775b77b84989799b6702f87ea21e3dd0ca811111a9963b177529d61131d9b392cbd0acd6

    • SSDEEP

      196608:91OIM6e41Qo8DYFol79VtoicAk9YuxSCS/pDF5YwERvq6:3Op141Qo2c+xVt9oY4/SP5YwCq6

    • Modifies Windows Defender Real-time Protection settings

    • Windows security bypass

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks