General

  • Target

    e6a2ec4e94f078ce9333be2a8b08371a4de0b17b7513bf05e65ee680646c77cd

  • Size

    1000KB

  • Sample

    230424-ezvpqshf99

  • MD5

    7503b723c9e5ccd9351f32af619ac28c

  • SHA1

    2a3ba328e4fc641fe60854984f49d2c29a1f6a4c

  • SHA256

    e6a2ec4e94f078ce9333be2a8b08371a4de0b17b7513bf05e65ee680646c77cd

  • SHA512

    1306760d503c0f8d5ae46a015b4f056357b1563ff3d68829749921aa391730afcb1c9f8e251a766af95ee8602078283d1adace6d4efe1eb618481b7e7457e156

  • SSDEEP

    24576:0TLrvnFOPYjIA0NCw+J3Hl+yV5vCoyvIc5zlYWSSpb:6rvFqYjbfJV+QvCoyZzt9p

Malware Config

Targets

    • Target

      e6a2ec4e94f078ce9333be2a8b08371a4de0b17b7513bf05e65ee680646c77cd

    • Size

      1000KB

    • MD5

      7503b723c9e5ccd9351f32af619ac28c

    • SHA1

      2a3ba328e4fc641fe60854984f49d2c29a1f6a4c

    • SHA256

      e6a2ec4e94f078ce9333be2a8b08371a4de0b17b7513bf05e65ee680646c77cd

    • SHA512

      1306760d503c0f8d5ae46a015b4f056357b1563ff3d68829749921aa391730afcb1c9f8e251a766af95ee8602078283d1adace6d4efe1eb618481b7e7457e156

    • SSDEEP

      24576:0TLrvnFOPYjIA0NCw+J3Hl+yV5vCoyvIc5zlYWSSpb:6rvFqYjbfJV+QvCoyZzt9p

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks