General

  • Target

    16473faa72129b3e9f74ab540d86a602627b5906ce6e48064cb2c2fd9151c59d

  • Size

    828KB

  • Sample

    230420-et34xsfd87

  • MD5

    32f82dba039e69c754fb274c61e01abf

  • SHA1

    e25d377f682cd95fb34e096be90e76d31bb7e495

  • SHA256

    16473faa72129b3e9f74ab540d86a602627b5906ce6e48064cb2c2fd9151c59d

  • SHA512

    6026ac7a6540416926f4d058131db3f888a349f8890faa40d7d6fad6f1c4b58da59091f0df40480896663987dca0c4b810cd0bd8ace8e73912a0601b5e1290b0

  • SSDEEP

    12288:py90GICNV/QSfAMQtQ7o+V0JoI7AdwoEJXYGAAX2fVNXHpd0VyzvFeht0g6B5y:py+SVNfAptQ7fWAwfBX2fVNXHhQIy

Malware Config

Targets

    • Target

      16473faa72129b3e9f74ab540d86a602627b5906ce6e48064cb2c2fd9151c59d

    • Size

      828KB

    • MD5

      32f82dba039e69c754fb274c61e01abf

    • SHA1

      e25d377f682cd95fb34e096be90e76d31bb7e495

    • SHA256

      16473faa72129b3e9f74ab540d86a602627b5906ce6e48064cb2c2fd9151c59d

    • SHA512

      6026ac7a6540416926f4d058131db3f888a349f8890faa40d7d6fad6f1c4b58da59091f0df40480896663987dca0c4b810cd0bd8ace8e73912a0601b5e1290b0

    • SSDEEP

      12288:py90GICNV/QSfAMQtQ7o+V0JoI7AdwoEJXYGAAX2fVNXHpd0VyzvFeht0g6B5y:py+SVNfAptQ7fWAwfBX2fVNXHhQIy

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks