General

  • Target

    837f081912a2cbb28aa8b0eee2df7318b41e8d6cdbc7016371e3e62233217e79

  • Size

    1.2MB

  • Sample

    230423-xfxzvsgh4s

  • MD5

    2b020875b213efc8888c00a661dff59d

  • SHA1

    bbc1596514eb0d0cb0fb4d773cc86f2f4ae8e899

  • SHA256

    837f081912a2cbb28aa8b0eee2df7318b41e8d6cdbc7016371e3e62233217e79

  • SHA512

    90b97ab36b6f2c7bba799ec427be2d8759e01dfd5df5166f6a71adebbb06a25dcf754f8795f08c11fbada17d6e7018df7e60b2f6e1a606525c1dd8c3024103f9

  • SSDEEP

    24576:NLJQ+aYD/kHU5ClpZ1SKDtJttwyf6ws1tJ+cJGuFFw:NtQbWAJpsAX6JZJG8

Malware Config

Targets

    • Target

      837f081912a2cbb28aa8b0eee2df7318b41e8d6cdbc7016371e3e62233217e79

    • Size

      1.2MB

    • MD5

      2b020875b213efc8888c00a661dff59d

    • SHA1

      bbc1596514eb0d0cb0fb4d773cc86f2f4ae8e899

    • SHA256

      837f081912a2cbb28aa8b0eee2df7318b41e8d6cdbc7016371e3e62233217e79

    • SHA512

      90b97ab36b6f2c7bba799ec427be2d8759e01dfd5df5166f6a71adebbb06a25dcf754f8795f08c11fbada17d6e7018df7e60b2f6e1a606525c1dd8c3024103f9

    • SSDEEP

      24576:NLJQ+aYD/kHU5ClpZ1SKDtJttwyf6ws1tJ+cJGuFFw:NtQbWAJpsAX6JZJG8

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks