General

  • Target

    ac354971e92ba6f5361984e2e4012e8f53dfecd98f2bc2ad699724b4fde44d13

  • Size

    747KB

  • Sample

    230424-1ky99seg24

  • MD5

    10c8c50b725c5e010ec8ea285f8c2b0b

  • SHA1

    8657da84cc3aefeaf01cca7550e72d6c672d0eaf

  • SHA256

    ac354971e92ba6f5361984e2e4012e8f53dfecd98f2bc2ad699724b4fde44d13

  • SHA512

    d071fd48e5a5b4f9fa71c162bb2e19ff78c8d220e0db4fabd7101655fe46516ffdc203d9f219a56c72bbe13d368c0af19f6356f7af83c3f506c30407fdb86393

  • SSDEEP

    12288:1y90YFTYMyxGrzWJ4SLMrnhtkrjeq39hQ0TbB4whrF2Av984va0Vzf:1yZgAChMrnhuHJG8bBZNW4v3zf

Malware Config

Targets

    • Target

      ac354971e92ba6f5361984e2e4012e8f53dfecd98f2bc2ad699724b4fde44d13

    • Size

      747KB

    • MD5

      10c8c50b725c5e010ec8ea285f8c2b0b

    • SHA1

      8657da84cc3aefeaf01cca7550e72d6c672d0eaf

    • SHA256

      ac354971e92ba6f5361984e2e4012e8f53dfecd98f2bc2ad699724b4fde44d13

    • SHA512

      d071fd48e5a5b4f9fa71c162bb2e19ff78c8d220e0db4fabd7101655fe46516ffdc203d9f219a56c72bbe13d368c0af19f6356f7af83c3f506c30407fdb86393

    • SSDEEP

      12288:1y90YFTYMyxGrzWJ4SLMrnhtkrjeq39hQ0TbB4whrF2Av984va0Vzf:1yZgAChMrnhuHJG8bBZNW4v3zf

    • Modifies Windows Defender Real-time Protection settings

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks