General

  • Target

    4e80e6d54f39ef4f3329710e904d22227b3aa620893a6ab2c2de1ec777510d10

  • Size

    939KB

  • Sample

    230418-wzz3wsfa4t

  • MD5

    d86fd3ea7d5e81ddd4c7a1efeaec3fab

  • SHA1

    b5858feb0fd0daf97c01930d819172e7b206b353

  • SHA256

    4e80e6d54f39ef4f3329710e904d22227b3aa620893a6ab2c2de1ec777510d10

  • SHA512

    8a40f1f8c5be2d96d2690ee5a9ee5924190aa70d9652386a3d9d421a6eb5e2facff4e8887d7e52e28fb8dc7379f3fbdd2630e988b5554ce5d4ab8481b0efcd30

  • SSDEEP

    12288:ly9075494TfLbkAL6ArnOXwSSSUvv1eBlQmYZ5KrVYs1kJvpV9Mrloicu7bm0icS:lyU49oYXbPBQjZE5HcRosu7YcSR

Malware Config

Targets

    • Target

      4e80e6d54f39ef4f3329710e904d22227b3aa620893a6ab2c2de1ec777510d10

    • Size

      939KB

    • MD5

      d86fd3ea7d5e81ddd4c7a1efeaec3fab

    • SHA1

      b5858feb0fd0daf97c01930d819172e7b206b353

    • SHA256

      4e80e6d54f39ef4f3329710e904d22227b3aa620893a6ab2c2de1ec777510d10

    • SHA512

      8a40f1f8c5be2d96d2690ee5a9ee5924190aa70d9652386a3d9d421a6eb5e2facff4e8887d7e52e28fb8dc7379f3fbdd2630e988b5554ce5d4ab8481b0efcd30

    • SSDEEP

      12288:ly9075494TfLbkAL6ArnOXwSSSUvv1eBlQmYZ5KrVYs1kJvpV9Mrloicu7bm0icS:lyU49oYXbPBQjZE5HcRosu7YcSR

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks