General

  • Target

    ed875496f802d5001c9f5d464890d91c5b11574e698732186e56794581de52ce

  • Size

    807KB

  • Sample

    230421-1cewnabh6z

  • MD5

    84ef4cdf6fb7c65fa671d4fcbafc9e4f

  • SHA1

    75023c49bb28b5869b7df631228d7313cd3d686e

  • SHA256

    ed875496f802d5001c9f5d464890d91c5b11574e698732186e56794581de52ce

  • SHA512

    1d533d79d3adfd13cbbdd05c11805c46230841bd2120db906cdb5461637ed55ad622929ebefcb2039935d42e4cc1a1b36d289702ed632dc318d73a819464405e

  • SSDEEP

    12288:vy90gQa0VJ4GmWYHwZ2ErLR53/Garo7/rDqoBixOn32Vxgwjl32IQzen4oU3G:vyQnVMWQwZZ153uMmGh83o99QK4oU3G

Malware Config

Targets

    • Target

      ed875496f802d5001c9f5d464890d91c5b11574e698732186e56794581de52ce

    • Size

      807KB

    • MD5

      84ef4cdf6fb7c65fa671d4fcbafc9e4f

    • SHA1

      75023c49bb28b5869b7df631228d7313cd3d686e

    • SHA256

      ed875496f802d5001c9f5d464890d91c5b11574e698732186e56794581de52ce

    • SHA512

      1d533d79d3adfd13cbbdd05c11805c46230841bd2120db906cdb5461637ed55ad622929ebefcb2039935d42e4cc1a1b36d289702ed632dc318d73a819464405e

    • SSDEEP

      12288:vy90gQa0VJ4GmWYHwZ2ErLR53/Garo7/rDqoBixOn32Vxgwjl32IQzen4oU3G:vyQnVMWQwZZ153uMmGh83o99QK4oU3G

    • Modifies Windows Defender Real-time Protection settings

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks