General

  • Target

    6f9e62d0b6c4578041bb7e5f260a3af2.bin

  • Size

    662KB

  • Sample

    230424-b5lggahb68

  • MD5

    7fada68c2028d450f732dfddd05e4cde

  • SHA1

    f82f130231821e42c135a04b8be08b5e5145bfab

  • SHA256

    22e27fa7b0313c0aac9bd3b3f6e00560e90669ad9df022a5b85a3c6f37966446

  • SHA512

    5967cc2bb7e0f8e2f5cfe436f631386ec5e22bab3b4e1170971a4955f37d8e84963c748cfb0db809d2b7d436b6759b49168388f0860fbf466e67fd5b37d0e813

  • SSDEEP

    12288:7SlcDcDC4sZwBwAxc3KmIQaTRPDkQQQLjhPUAdNTadkx/+gh6Aa84ESIm/+Yu0Nt:mljDClwGKmA2QHjyG0QU/fIm3u0NR1gq

Malware Config

Targets

    • Target

      924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe

    • Size

      706KB

    • MD5

      6f9e62d0b6c4578041bb7e5f260a3af2

    • SHA1

      99a757be872960e28dda4cb2fe97a4b606065158

    • SHA256

      924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414

    • SHA512

      dff51890031e5dbc8f1f9432ea3e737654269b53f5718319326c9889ac2fbe32b172e55453986c223f7efdeef009649f5a4ce26f920ca20c28e4b18ea01bf543

    • SSDEEP

      12288:cy90EHGH019kpTfCWI9r/tgg12QwRvXZtRhvTNc+CPPmr9:cyTTAdaW8rXWFhyPk

    • Modifies Windows Defender Real-time Protection settings

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks