General

  • Target

    068e678226778282ddc6a77dcb29c46c12b1d204727367eedd5df0e6055aa57d

  • Size

    920KB

  • Sample

    230420-24jjlach26

  • MD5

    386cb2f32315638aa753811816ba5a43

  • SHA1

    622df9d19bccc301f3539e910f55c6b29be6486e

  • SHA256

    068e678226778282ddc6a77dcb29c46c12b1d204727367eedd5df0e6055aa57d

  • SHA512

    10841515b2a43fb5e9b161a5258409755ef6ad8e577f0e9125cd6e2685e70a5bff8f8555506bd1d500d80cb42e9a69432e3aaee1ce082e48091d32e31c5e5fcd

  • SSDEEP

    12288:Dy90hcZAVqW/DZKCaT/hDBe0PA3B0mN/3euUaOKNU78kaIk7AGccn6a/xdyQ/z6K:DyPZwDyfe0g0mgaOKt7AGcQ6cyQ2K

Malware Config

Targets

    • Target

      068e678226778282ddc6a77dcb29c46c12b1d204727367eedd5df0e6055aa57d

    • Size

      920KB

    • MD5

      386cb2f32315638aa753811816ba5a43

    • SHA1

      622df9d19bccc301f3539e910f55c6b29be6486e

    • SHA256

      068e678226778282ddc6a77dcb29c46c12b1d204727367eedd5df0e6055aa57d

    • SHA512

      10841515b2a43fb5e9b161a5258409755ef6ad8e577f0e9125cd6e2685e70a5bff8f8555506bd1d500d80cb42e9a69432e3aaee1ce082e48091d32e31c5e5fcd

    • SSDEEP

      12288:Dy90hcZAVqW/DZKCaT/hDBe0PA3B0mN/3euUaOKNU78kaIk7AGccn6a/xdyQ/z6K:DyPZwDyfe0g0mgaOKt7AGcQ6cyQ2K

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks