General

  • Target

    d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83

  • Size

    706KB

  • Sample

    230423-e7d2ysba65

  • MD5

    884fdfda3a310db4e265690a8583f5b8

  • SHA1

    5e4d20d83835d4ea7a362cf987c5a4da5d38befc

  • SHA256

    d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83

  • SHA512

    1c380db8820ab521d3dd41deffb1c37edbe6d71385d86f92586d5d2602762b0fc8f60113406e263cd47a0399c5f5d17b67c9f94e90414d4c8701b57904b4db8a

  • SSDEEP

    12288:Yy909q8q8oLqwBuXt4xSpemfvdZyhnEPjmGeUpBpdyFTn1wquFVJ0vbovGVSmdr:YytP8IqwE4YpenMteAaRXpkvGVSm5

Malware Config

Targets

    • Target

      d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83

    • Size

      706KB

    • MD5

      884fdfda3a310db4e265690a8583f5b8

    • SHA1

      5e4d20d83835d4ea7a362cf987c5a4da5d38befc

    • SHA256

      d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83

    • SHA512

      1c380db8820ab521d3dd41deffb1c37edbe6d71385d86f92586d5d2602762b0fc8f60113406e263cd47a0399c5f5d17b67c9f94e90414d4c8701b57904b4db8a

    • SSDEEP

      12288:Yy909q8q8oLqwBuXt4xSpemfvdZyhnEPjmGeUpBpdyFTn1wquFVJ0vbovGVSmdr:YytP8IqwE4YpenMteAaRXpkvGVSm5

    • Modifies Windows Defender Real-time Protection settings

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks