General

  • Target

    3aabaf73cdf5b3f712f4accaa906af3199a0d9888fa94b141b132bc2c01bbc57

  • Size

    1.3MB

  • Sample

    230419-s1e8bsdc9x

  • MD5

    b399523f90d8c7f211a4ade872a81b9b

  • SHA1

    694f8b7e8f8d509c21324df8bc01080b1b8cf783

  • SHA256

    3aabaf73cdf5b3f712f4accaa906af3199a0d9888fa94b141b132bc2c01bbc57

  • SHA512

    7edcd80fdcf22abbe27bab767daad50be8d6985c313e056cc49ff1fcf48cf2c3597fcabe68badcb72f13c7aa7443d6f3fd5eff27e02560dccee8aac0523d7e66

  • SSDEEP

    24576:nyfEfo0I57lhXqXuYeqNaK3vEKHZW85hwo0ST6lEnJPwOuiJCA7Sr:yf0KPhXBYTNS0xwoL682OutP

Malware Config

Targets

    • Target

      3aabaf73cdf5b3f712f4accaa906af3199a0d9888fa94b141b132bc2c01bbc57

    • Size

      1.3MB

    • MD5

      b399523f90d8c7f211a4ade872a81b9b

    • SHA1

      694f8b7e8f8d509c21324df8bc01080b1b8cf783

    • SHA256

      3aabaf73cdf5b3f712f4accaa906af3199a0d9888fa94b141b132bc2c01bbc57

    • SHA512

      7edcd80fdcf22abbe27bab767daad50be8d6985c313e056cc49ff1fcf48cf2c3597fcabe68badcb72f13c7aa7443d6f3fd5eff27e02560dccee8aac0523d7e66

    • SSDEEP

      24576:nyfEfo0I57lhXqXuYeqNaK3vEKHZW85hwo0ST6lEnJPwOuiJCA7Sr:yf0KPhXBYTNS0xwoL682OutP

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks