General

  • Target

    ADZP 20 Complex.exe

  • Size

    102KB

  • Sample

    230406-2q1wqahe2w

  • MD5

    b64873bc80527aa8e18c0a3b95244f19

  • SHA1

    af6c574a2b8fac6a565c551a196ce07e92fd05cc

  • SHA256

    30a220aed9f5c0c92a4737a4f32b2ce66eb3d1e8525d0b6879321592b79096ca

  • SHA512

    b78165b6edec3abd32ee2bd0465cbc7e30fc14c32db66b65bebb0c1d5a7061cec85172f26a57b97630baa47ee17405560f17da5f37d9f80d141dba5198158f7c

  • SSDEEP

    1536:j7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIf9w2PwpLpNuOh:/7DhdC6kzWypvaQ0FxyNTBf9T8Dv

Malware Config

Targets

    • Target

      ADZP 20 Complex.exe

    • Size

      102KB

    • MD5

      b64873bc80527aa8e18c0a3b95244f19

    • SHA1

      af6c574a2b8fac6a565c551a196ce07e92fd05cc

    • SHA256

      30a220aed9f5c0c92a4737a4f32b2ce66eb3d1e8525d0b6879321592b79096ca

    • SHA512

      b78165b6edec3abd32ee2bd0465cbc7e30fc14c32db66b65bebb0c1d5a7061cec85172f26a57b97630baa47ee17405560f17da5f37d9f80d141dba5198158f7c

    • SSDEEP

      1536:j7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIf9w2PwpLpNuOh:/7DhdC6kzWypvaQ0FxyNTBf9T8Dv

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Execution

Command-Line Interface

1
T1059

Defense Evasion

File Permissions Modification

1
T1222

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Collection

Data from Local System

1
T1005

Tasks