General

  • Target

    662d60b9c46a4a757d2bc70004efe4e5e1db529c4eb226c4326a8197a60f0b18

  • Size

    965KB

  • Sample

    230422-jkhh3sfc9y

  • MD5

    8cf76e2dbe27e3ba1ae76b28bad2f2ad

  • SHA1

    e8ea2d95ff6e80279326493d627c7df02b056f40

  • SHA256

    662d60b9c46a4a757d2bc70004efe4e5e1db529c4eb226c4326a8197a60f0b18

  • SHA512

    87a505abe1b47e55f4784cf3d5bfa9f935b58c4589c9030e6f39aca4bd84af1c7176d92dfc7bdfb3fb13fc848cc88d82c59731541de317d2449817e6b0d0b2b0

  • SSDEEP

    24576:Lyvlj/g0+EjeW2JH04nV7JuOcGdejziisFaxem9LJUCUn:+vljjteW4UYJOGdejzdsFaxemEf

Malware Config

Targets

    • Target

      662d60b9c46a4a757d2bc70004efe4e5e1db529c4eb226c4326a8197a60f0b18

    • Size

      965KB

    • MD5

      8cf76e2dbe27e3ba1ae76b28bad2f2ad

    • SHA1

      e8ea2d95ff6e80279326493d627c7df02b056f40

    • SHA256

      662d60b9c46a4a757d2bc70004efe4e5e1db529c4eb226c4326a8197a60f0b18

    • SHA512

      87a505abe1b47e55f4784cf3d5bfa9f935b58c4589c9030e6f39aca4bd84af1c7176d92dfc7bdfb3fb13fc848cc88d82c59731541de317d2449817e6b0d0b2b0

    • SSDEEP

      24576:Lyvlj/g0+EjeW2JH04nV7JuOcGdejziisFaxem9LJUCUn:+vljjteW4UYJOGdejzdsFaxemEf

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks