General

  • Target

    ef3502b913bb74c05c2276c9ee283df1c59f12bc92a84e52a79525bfc476f2db

  • Size

    828KB

  • Sample

    230420-eaqz9afd23

  • MD5

    6299b71a5f1d598dad0f16055bac2036

  • SHA1

    fb7642ef13ba7cefa390e631b0a043c3a453d09d

  • SHA256

    ef3502b913bb74c05c2276c9ee283df1c59f12bc92a84e52a79525bfc476f2db

  • SHA512

    f32b826b570fccd6dca7152aa4c2ea7fd0f05b140ad25af00dae94863c88f68f8ddb6c45ecf07fb345672efed9477a32ea6aef82e9be8298adce2d35944adb84

  • SSDEEP

    12288:4y90k/R7J7/FQytnG8U8rj5C3Z1eCpNwTpGA7g6v7SXw4e2BmlPn70d4i31xK:4y5JJ/OMG8UsjIzLr0g6v7SbclPqxK

Malware Config

Targets

    • Target

      ef3502b913bb74c05c2276c9ee283df1c59f12bc92a84e52a79525bfc476f2db

    • Size

      828KB

    • MD5

      6299b71a5f1d598dad0f16055bac2036

    • SHA1

      fb7642ef13ba7cefa390e631b0a043c3a453d09d

    • SHA256

      ef3502b913bb74c05c2276c9ee283df1c59f12bc92a84e52a79525bfc476f2db

    • SHA512

      f32b826b570fccd6dca7152aa4c2ea7fd0f05b140ad25af00dae94863c88f68f8ddb6c45ecf07fb345672efed9477a32ea6aef82e9be8298adce2d35944adb84

    • SSDEEP

      12288:4y90k/R7J7/FQytnG8U8rj5C3Z1eCpNwTpGA7g6v7SXw4e2BmlPn70d4i31xK:4y5JJ/OMG8UsjIzLr0g6v7SbclPqxK

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks