General

  • Target

    2b21432e4f8c1c53e36993d0fbdd97e158acd53edede431e54ee3af2d11121ea

  • Size

    1.0MB

  • Sample

    230421-dherhsdg66

  • MD5

    44dae4fadafb9bc1a16373aaf2191495

  • SHA1

    6229a21ba3488802d0fa2b10cb8e83320fa96b3e

  • SHA256

    2b21432e4f8c1c53e36993d0fbdd97e158acd53edede431e54ee3af2d11121ea

  • SHA512

    694a49c5d7902bbfe925c7c39732225123e1a5dd705a6ab61d8fe6559ba0e20754fc501a78923f40d66492f066f1ba18400c594cc746dadcf7e4a8472420abef

  • SSDEEP

    12288:0y90BRDuMgxtJKZAOluY9nwQlifhBj/hlEiTac0XBgw0JIW5HQCKO8BPBfR+J+xK:0ymSK7ogipBDhVdJZjofRvI7nT9CaR

Malware Config

Targets

    • Target

      2b21432e4f8c1c53e36993d0fbdd97e158acd53edede431e54ee3af2d11121ea

    • Size

      1.0MB

    • MD5

      44dae4fadafb9bc1a16373aaf2191495

    • SHA1

      6229a21ba3488802d0fa2b10cb8e83320fa96b3e

    • SHA256

      2b21432e4f8c1c53e36993d0fbdd97e158acd53edede431e54ee3af2d11121ea

    • SHA512

      694a49c5d7902bbfe925c7c39732225123e1a5dd705a6ab61d8fe6559ba0e20754fc501a78923f40d66492f066f1ba18400c594cc746dadcf7e4a8472420abef

    • SSDEEP

      12288:0y90BRDuMgxtJKZAOluY9nwQlifhBj/hlEiTac0XBgw0JIW5HQCKO8BPBfR+J+xK:0ymSK7ogipBDhVdJZjofRvI7nT9CaR

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks