General

  • Target

    2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2

  • Size

    568KB

  • Sample

    230422-ce1n5sdf3w

  • MD5

    9e64bb9cbfdfd6f5ef2f426e4e305c0c

  • SHA1

    dac3cff0a3de05be1d9f26ada41f2e3dc2cbd642

  • SHA256

    2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2

  • SHA512

    95e1c212fa856c49e2bc725c739e3f8dc703e648bc96224f283a3a45bc9e08c29005bfb9510e93361618d8b899ee8a990337dca329a241e9482ead0648cdb39e

  • SSDEEP

    12288:Fy90DKdnyIvGaopZfN/mxrhiYtOmPdE2+eI7KGvB:FyCQnBJopZl/HYtho9Kc

Malware Config

Targets

    • Target

      2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2

    • Size

      568KB

    • MD5

      9e64bb9cbfdfd6f5ef2f426e4e305c0c

    • SHA1

      dac3cff0a3de05be1d9f26ada41f2e3dc2cbd642

    • SHA256

      2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2

    • SHA512

      95e1c212fa856c49e2bc725c739e3f8dc703e648bc96224f283a3a45bc9e08c29005bfb9510e93361618d8b899ee8a990337dca329a241e9482ead0648cdb39e

    • SSDEEP

      12288:Fy90DKdnyIvGaopZfN/mxrhiYtOmPdE2+eI7KGvB:FyCQnBJopZl/HYtho9Kc

    • Modifies Windows Defender Real-time Protection settings

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks