General

  • Target

    67d4c3ee2211d9f72e332b4d44af5f9a9ce25d9b66b547c71674c73d393bc217

  • Size

    965KB

  • Sample

    230422-bpl33adc91

  • MD5

    bb65cdf54bd29570f8327e17c466a3f4

  • SHA1

    85f6ce13efc42908eb05a4b04056a5a13a9e8bc4

  • SHA256

    67d4c3ee2211d9f72e332b4d44af5f9a9ce25d9b66b547c71674c73d393bc217

  • SHA512

    2aafac8c2d4a37c5fdfe8fe9c2aadbaf63e1395d1ff508225db4bb94d1ea3084e51ed85f7ecf8cd0e457025fca92e5e21ed4263314345edf7a4304dff47f4958

  • SSDEEP

    24576:hyYpwAti9sjZCznnX0gcB1Uj3xeOiVmKfCPT7Yv:UqdtiWlCznpIU9WVtaPvY

Malware Config

Targets

    • Target

      67d4c3ee2211d9f72e332b4d44af5f9a9ce25d9b66b547c71674c73d393bc217

    • Size

      965KB

    • MD5

      bb65cdf54bd29570f8327e17c466a3f4

    • SHA1

      85f6ce13efc42908eb05a4b04056a5a13a9e8bc4

    • SHA256

      67d4c3ee2211d9f72e332b4d44af5f9a9ce25d9b66b547c71674c73d393bc217

    • SHA512

      2aafac8c2d4a37c5fdfe8fe9c2aadbaf63e1395d1ff508225db4bb94d1ea3084e51ed85f7ecf8cd0e457025fca92e5e21ed4263314345edf7a4304dff47f4958

    • SSDEEP

      24576:hyYpwAti9sjZCznnX0gcB1Uj3xeOiVmKfCPT7Yv:UqdtiWlCznpIU9WVtaPvY

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks