General

  • Target

    28a0968ed57e57d4b841afc4151d9ecadc82a87a104514cf2fb03617a8a90fab

  • Size

    827KB

  • Sample

    230420-b22paagg2s

  • MD5

    d44367cda370a7a49f9b8597e53a33a0

  • SHA1

    8e711e04601da0e3b1fd9064a65dda5245de8c58

  • SHA256

    28a0968ed57e57d4b841afc4151d9ecadc82a87a104514cf2fb03617a8a90fab

  • SHA512

    32b8145211f0480137c926a028986d5c700c2933b2798a10934c5a345dfdefb3f2aec5e07c8d3c37be48e2d90fd02f633bc835376e4f85a72800ad4077b7a2ca

  • SSDEEP

    12288:1y90HhVJk9WvccUVUBI981Ym8F6wXX1Q89pbkpvKlyWWIbBpwNV95YsWWAq:1yshVJd/UyBIVXXJbkpyMWWEC3WWr

Malware Config

Targets

    • Target

      28a0968ed57e57d4b841afc4151d9ecadc82a87a104514cf2fb03617a8a90fab

    • Size

      827KB

    • MD5

      d44367cda370a7a49f9b8597e53a33a0

    • SHA1

      8e711e04601da0e3b1fd9064a65dda5245de8c58

    • SHA256

      28a0968ed57e57d4b841afc4151d9ecadc82a87a104514cf2fb03617a8a90fab

    • SHA512

      32b8145211f0480137c926a028986d5c700c2933b2798a10934c5a345dfdefb3f2aec5e07c8d3c37be48e2d90fd02f633bc835376e4f85a72800ad4077b7a2ca

    • SSDEEP

      12288:1y90HhVJk9WvccUVUBI981Ym8F6wXX1Q89pbkpvKlyWWIbBpwNV95YsWWAq:1yshVJd/UyBIVXXJbkpyMWWEC3WWr

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks