General

  • Target

    1e8f4350a04074978a7075ce6f6da54aae063dee96273b9817b6eefa9dc33bab

  • Size

    827KB

  • Sample

    230419-j9xpasbb5v

  • MD5

    87e925ed06e6a5d7d749dc60426213be

  • SHA1

    6ce1307d0c51afdbab78ddce983cbcf47fe0b123

  • SHA256

    1e8f4350a04074978a7075ce6f6da54aae063dee96273b9817b6eefa9dc33bab

  • SHA512

    545e4b469720d0d22e1501d35b7dc1b0163cc2c15143f2d8baa048a085b0b2c34649e7cb118a3f57062dad10c87bc4fa8dfcd8ebab8ceff887e272d9518fa706

  • SSDEEP

    12288:Fy905QbTyUkNpa+Hg+mqmpKYpXR37UEbFHwhGd7sayOr9WUL54E:FyqQbT1kjG+XERrBbKazHl4E

Malware Config

Targets

    • Target

      1e8f4350a04074978a7075ce6f6da54aae063dee96273b9817b6eefa9dc33bab

    • Size

      827KB

    • MD5

      87e925ed06e6a5d7d749dc60426213be

    • SHA1

      6ce1307d0c51afdbab78ddce983cbcf47fe0b123

    • SHA256

      1e8f4350a04074978a7075ce6f6da54aae063dee96273b9817b6eefa9dc33bab

    • SHA512

      545e4b469720d0d22e1501d35b7dc1b0163cc2c15143f2d8baa048a085b0b2c34649e7cb118a3f57062dad10c87bc4fa8dfcd8ebab8ceff887e272d9518fa706

    • SSDEEP

      12288:Fy905QbTyUkNpa+Hg+mqmpKYpXR37UEbFHwhGd7sayOr9WUL54E:FyqQbT1kjG+XERrBbKazHl4E

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks