General

  • Target

    40c9fee956bb44dfe052c1033d6ceeb6086b6ec9e60f49534d76d1e0420c6dab

  • Size

    938KB

  • Sample

    230418-rjaqvadf7y

  • MD5

    fc11b6f34ba23e3813cf1fcf3efe5783

  • SHA1

    a699784d9fa4b9eeffd433f620df464dab6a62a5

  • SHA256

    40c9fee956bb44dfe052c1033d6ceeb6086b6ec9e60f49534d76d1e0420c6dab

  • SHA512

    e0192c73c390689005e40946080ae52906a4f111ceadd9b3edc95972bcfed3f1c4c6efb3f67f96ad640f4421bf1bb9c1c5a120075082c15b605f3bf17d118872

  • SSDEEP

    12288:Hy90uFPF9a7/eEFmlJg1DUHRK3ZDzMdYr5d0g1TIIzHmMCZyiEn7dDIIox9eJNPY:Hynt91S1DUxK3ZP6geIjVC8iCDhofec

Malware Config

Targets

    • Target

      40c9fee956bb44dfe052c1033d6ceeb6086b6ec9e60f49534d76d1e0420c6dab

    • Size

      938KB

    • MD5

      fc11b6f34ba23e3813cf1fcf3efe5783

    • SHA1

      a699784d9fa4b9eeffd433f620df464dab6a62a5

    • SHA256

      40c9fee956bb44dfe052c1033d6ceeb6086b6ec9e60f49534d76d1e0420c6dab

    • SHA512

      e0192c73c390689005e40946080ae52906a4f111ceadd9b3edc95972bcfed3f1c4c6efb3f67f96ad640f4421bf1bb9c1c5a120075082c15b605f3bf17d118872

    • SSDEEP

      12288:Hy90uFPF9a7/eEFmlJg1DUHRK3ZDzMdYr5d0g1TIIzHmMCZyiEn7dDIIox9eJNPY:Hynt91S1DUxK3ZP6geIjVC8iCDhofec

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks