General

  • Target

    file

  • Size

    7.2MB

  • Sample

    230206-d9lddabh84

  • MD5

    1078c9a61262f49cd4a80464d3b3d4d4

  • SHA1

    33f227476ac67560f01e7ba6eacc5b07575c545f

  • SHA256

    365864f4998879df7fcac700b84e40172b9b3aadfd5032fd38801499eb64e90e

  • SHA512

    ccc8e0b06467fdbcb2b1843f38a0035a7a55870d6e743c0dddaae15232808c7aa283e5898f67e3edc1997a021b9c0d7ccf31f348acf3d8dfbc84f5025a7a2a44

  • SSDEEP

    98304:91Of2m4GZm0Ii6C5IdFuFR+jYLZupYX6hsn3vYdRROL7uK3Wa5sIVBMw1vyTa:91OfeVbMIKFR+jYluk9vYlYZRjvqa

Malware Config

Targets

    • Target

      file

    • Size

      7.2MB

    • MD5

      1078c9a61262f49cd4a80464d3b3d4d4

    • SHA1

      33f227476ac67560f01e7ba6eacc5b07575c545f

    • SHA256

      365864f4998879df7fcac700b84e40172b9b3aadfd5032fd38801499eb64e90e

    • SHA512

      ccc8e0b06467fdbcb2b1843f38a0035a7a55870d6e743c0dddaae15232808c7aa283e5898f67e3edc1997a021b9c0d7ccf31f348acf3d8dfbc84f5025a7a2a44

    • SSDEEP

      98304:91Of2m4GZm0Ii6C5IdFuFR+jYLZupYX6hsn3vYdRROL7uK3Wa5sIVBMw1vyTa:91OfeVbMIKFR+jYluk9vYlYZRjvqa

    • Modifies Windows Defender Real-time Protection settings

    • Windows security bypass

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks