General

  • Target

    dcbc04f40e7a25ec1f7e444c492f32c99e51304b40f39d7c2dfef4c7bb1033a0

  • Size

    919KB

  • Sample

    230420-1192psee5v

  • MD5

    d467c12c3fe530b4911d4fac4dd1d846

  • SHA1

    26dfb98db454462d8fd9dc2c536452c530f9b474

  • SHA256

    dcbc04f40e7a25ec1f7e444c492f32c99e51304b40f39d7c2dfef4c7bb1033a0

  • SHA512

    c2c5e99ced15a9d9eaf16385cb078979d7e04a49d6033346bfd653453ab4ce362484faa97f7285249e2bee7563aa9cb975e307917b46a92d3b3b66370349a68b

  • SSDEEP

    12288:Hy90dtpznbSMIarvCXYEovoo9JNs3emo5YKk0lLa6GflEBb3QvC2l1Fq5Kk/sY:Hy27+X6aoEgJZ5YKk0Ba6GfG1wjRHY

Malware Config

Targets

    • Target

      dcbc04f40e7a25ec1f7e444c492f32c99e51304b40f39d7c2dfef4c7bb1033a0

    • Size

      919KB

    • MD5

      d467c12c3fe530b4911d4fac4dd1d846

    • SHA1

      26dfb98db454462d8fd9dc2c536452c530f9b474

    • SHA256

      dcbc04f40e7a25ec1f7e444c492f32c99e51304b40f39d7c2dfef4c7bb1033a0

    • SHA512

      c2c5e99ced15a9d9eaf16385cb078979d7e04a49d6033346bfd653453ab4ce362484faa97f7285249e2bee7563aa9cb975e307917b46a92d3b3b66370349a68b

    • SSDEEP

      12288:Hy90dtpznbSMIarvCXYEovoo9JNs3emo5YKk0lLa6GflEBb3QvC2l1Fq5Kk/sY:Hy27+X6aoEgJZ5YKk0Ba6GfG1wjRHY

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks