General

  • Target

    271dd8fa2ff1d634086f14eed47617e51a2c384c846fbcf3a67c49a1018a2420

  • Size

    1.1MB

  • Sample

    230420-vyhlsadc31

  • MD5

    97d56a65b0c83b885c1719770113b3bb

  • SHA1

    b106c07e1bd85f3f6141202af509c69e2d2d66be

  • SHA256

    271dd8fa2ff1d634086f14eed47617e51a2c384c846fbcf3a67c49a1018a2420

  • SHA512

    fddda2f49f8d2afae47114d2727aa3e4703cb13fe2421afe13843425451ed2751841142ba1bcb4080be3b54a3e5d3a2ef65d45b0d08a7ca0858508bacdac6904

  • SSDEEP

    12288:dy900N3HlviPs5XsW7WRkRtYOS7rUm3FqHFbmqBCtPhuMd2IPuFGWBg4/ZqSbMp0:dyh5FvimB7kkX9p9BItJuw2Zx+4URkz

Malware Config

Targets

    • Target

      271dd8fa2ff1d634086f14eed47617e51a2c384c846fbcf3a67c49a1018a2420

    • Size

      1.1MB

    • MD5

      97d56a65b0c83b885c1719770113b3bb

    • SHA1

      b106c07e1bd85f3f6141202af509c69e2d2d66be

    • SHA256

      271dd8fa2ff1d634086f14eed47617e51a2c384c846fbcf3a67c49a1018a2420

    • SHA512

      fddda2f49f8d2afae47114d2727aa3e4703cb13fe2421afe13843425451ed2751841142ba1bcb4080be3b54a3e5d3a2ef65d45b0d08a7ca0858508bacdac6904

    • SSDEEP

      12288:dy900N3HlviPs5XsW7WRkRtYOS7rUm3FqHFbmqBCtPhuMd2IPuFGWBg4/ZqSbMp0:dyh5FvimB7kkX9p9BItJuw2Zx+4URkz

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks