General

  • Target

    8d6d74db607ea0b5a7e334f28657a67f1f5c428cb91c244300ff6b5e3e97ef34

  • Size

    936KB

  • Sample

    230420-l151esha78

  • MD5

    c54b8b85c040ffa6cb51cf2a962027a7

  • SHA1

    4016d5433b186804eb56e7f35a2c3d42146a2ce7

  • SHA256

    8d6d74db607ea0b5a7e334f28657a67f1f5c428cb91c244300ff6b5e3e97ef34

  • SHA512

    d80a8159f8408d8d24c1e966c307875309f9acd78a0b23808e6796f44b89af58487c32eb9861fe83cdd04beacfdb1a6d075fe890e40f805a730eeb80252a5ea8

  • SSDEEP

    12288:ay90Tk4nBy9hqj3jpT+I3fbT1zQhbiPS8Ma05ueaioLJWNv4cVDLZ4MWWup7:ayyk4ntLjrvlQiPmaVioAraMKp7

Malware Config

Targets

    • Target

      8d6d74db607ea0b5a7e334f28657a67f1f5c428cb91c244300ff6b5e3e97ef34

    • Size

      936KB

    • MD5

      c54b8b85c040ffa6cb51cf2a962027a7

    • SHA1

      4016d5433b186804eb56e7f35a2c3d42146a2ce7

    • SHA256

      8d6d74db607ea0b5a7e334f28657a67f1f5c428cb91c244300ff6b5e3e97ef34

    • SHA512

      d80a8159f8408d8d24c1e966c307875309f9acd78a0b23808e6796f44b89af58487c32eb9861fe83cdd04beacfdb1a6d075fe890e40f805a730eeb80252a5ea8

    • SSDEEP

      12288:ay90Tk4nBy9hqj3jpT+I3fbT1zQhbiPS8Ma05ueaioLJWNv4cVDLZ4MWWup7:ayyk4ntLjrvlQiPmaVioAraMKp7

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks