General

  • Target

    4a2ae2f2c7fd45239033139b7066b5a990120aaecc81a08d30a6c26d65735da8

  • Size

    921KB

  • Sample

    230420-2hp49aef5t

  • MD5

    be4cb39a45cb40c6179f84afd031ac16

  • SHA1

    e9f17ca15b1027c3c0e9b7bcefe9491db6e71bd3

  • SHA256

    4a2ae2f2c7fd45239033139b7066b5a990120aaecc81a08d30a6c26d65735da8

  • SHA512

    3bee5c586f4331e0b406496d9e498d605a8b71c61ca61ffe03c82054332ca09a06137d8485e574e3bfc3339df1e9c0fce56b78e6ba7ea25274926f3b016eed38

  • SSDEEP

    12288:Cy90yIvO6OjFOE6TUkLYMKzextgyukB6NNN3FMz59KKGDiVjw/Eqxi:CyN6OJUUs8WqLm59KKGm8/1c

Malware Config

Targets

    • Target

      4a2ae2f2c7fd45239033139b7066b5a990120aaecc81a08d30a6c26d65735da8

    • Size

      921KB

    • MD5

      be4cb39a45cb40c6179f84afd031ac16

    • SHA1

      e9f17ca15b1027c3c0e9b7bcefe9491db6e71bd3

    • SHA256

      4a2ae2f2c7fd45239033139b7066b5a990120aaecc81a08d30a6c26d65735da8

    • SHA512

      3bee5c586f4331e0b406496d9e498d605a8b71c61ca61ffe03c82054332ca09a06137d8485e574e3bfc3339df1e9c0fce56b78e6ba7ea25274926f3b016eed38

    • SSDEEP

      12288:Cy90yIvO6OjFOE6TUkLYMKzextgyukB6NNN3FMz59KKGDiVjw/Eqxi:CyN6OJUUs8WqLm59KKGm8/1c

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks