General

  • Target

    5e1b175839fdfe2ccd20bd8dd2ffacd0448de5d815d6472b61c55a478400d5e3

  • Size

    922KB

  • Sample

    230421-evah1aea86

  • MD5

    723d61be61ae10e67b4a8b7a6f72d6f5

  • SHA1

    8eee68ce7679d713b28214be6e9d768d309e1630

  • SHA256

    5e1b175839fdfe2ccd20bd8dd2ffacd0448de5d815d6472b61c55a478400d5e3

  • SHA512

    bbc4c325dca30c4b5c5376e593097bf3f52e36b9600f713db2e29e2f3d2face683bb4549d7f1411d0ade457bd1002c58e46395fdebeea1e4aa8ba489fac8a5e8

  • SSDEEP

    12288:My90rjwd3O8Em/Xi4PJB3axnog5HamjWCGEo+xFVV4rLnY7dzHYIN:MyMEde8Em/XigPaxn5dWa/OrLY7hfN

Malware Config

Targets

    • Target

      5e1b175839fdfe2ccd20bd8dd2ffacd0448de5d815d6472b61c55a478400d5e3

    • Size

      922KB

    • MD5

      723d61be61ae10e67b4a8b7a6f72d6f5

    • SHA1

      8eee68ce7679d713b28214be6e9d768d309e1630

    • SHA256

      5e1b175839fdfe2ccd20bd8dd2ffacd0448de5d815d6472b61c55a478400d5e3

    • SHA512

      bbc4c325dca30c4b5c5376e593097bf3f52e36b9600f713db2e29e2f3d2face683bb4549d7f1411d0ade457bd1002c58e46395fdebeea1e4aa8ba489fac8a5e8

    • SSDEEP

      12288:My90rjwd3O8Em/Xi4PJB3axnog5HamjWCGEo+xFVV4rLnY7dzHYIN:MyMEde8Em/XigPaxn5dWa/OrLY7hfN

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks