General

  • Target

    c101f7933fb9d94f03a0181ce98ec7a2bd87bf008b76dd56ad68192ee187c2b1

  • Size

    966KB

  • Sample

    230419-kmrefabc4z

  • MD5

    529a901bff2c32874564f4f20b0260ac

  • SHA1

    16cf3c8f3e5027a6c484f42bcbc636b2a340004b

  • SHA256

    c101f7933fb9d94f03a0181ce98ec7a2bd87bf008b76dd56ad68192ee187c2b1

  • SHA512

    e6257be4fc5973ed228a7c158f5bc8257bc9b32776ff4986c2710d009ff67b5cdb1a563d9cd5a86f11fb4f685bebd2b1f186f848c837c05c42eed74bb273d8bb

  • SSDEEP

    12288:Yy90qHZm5z4Y2whjR17m6IQGebSd4NCJmyYi3TcBFNxNZc/eKB4eOkXq1gtfBNMp:YyHm5vNCTQGASCqYGTAFY47kMgtZNq

Malware Config

Targets

    • Target

      c101f7933fb9d94f03a0181ce98ec7a2bd87bf008b76dd56ad68192ee187c2b1

    • Size

      966KB

    • MD5

      529a901bff2c32874564f4f20b0260ac

    • SHA1

      16cf3c8f3e5027a6c484f42bcbc636b2a340004b

    • SHA256

      c101f7933fb9d94f03a0181ce98ec7a2bd87bf008b76dd56ad68192ee187c2b1

    • SHA512

      e6257be4fc5973ed228a7c158f5bc8257bc9b32776ff4986c2710d009ff67b5cdb1a563d9cd5a86f11fb4f685bebd2b1f186f848c837c05c42eed74bb273d8bb

    • SSDEEP

      12288:Yy90qHZm5z4Y2whjR17m6IQGebSd4NCJmyYi3TcBFNxNZc/eKB4eOkXq1gtfBNMp:YyHm5vNCTQGASCqYGTAFY47kMgtZNq

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks