General

  • Target

    99a44d1f971cb2f142101e2947c43d2fb2b3f757cd1b169501641909a6341842

  • Size

    1.3MB

  • Sample

    230424-kt4y4sag77

  • MD5

    5a77723b3844506752e30acb70b15354

  • SHA1

    2f470a8c7fa05c4e9343f4fcdf2249ff0c76180a

  • SHA256

    99a44d1f971cb2f142101e2947c43d2fb2b3f757cd1b169501641909a6341842

  • SHA512

    d17116bcc7c2eec73b8140c542179f03ec4cbf03d8dbb85594a5933e403f0396419fc458323b0c5bae33808c4d7a148cce90bda91bc703a1fa8fb21376a1a5de

  • SSDEEP

    24576:GIKq5dNtV7We2GWqerZwO7Fk8YxeU5F8Si5LO+rImHhAs4ew2Hk4Q:GI/NKeU1ZwO+eUv8Sima5u4

Malware Config

Targets

    • Target

      99a44d1f971cb2f142101e2947c43d2fb2b3f757cd1b169501641909a6341842

    • Size

      1.3MB

    • MD5

      5a77723b3844506752e30acb70b15354

    • SHA1

      2f470a8c7fa05c4e9343f4fcdf2249ff0c76180a

    • SHA256

      99a44d1f971cb2f142101e2947c43d2fb2b3f757cd1b169501641909a6341842

    • SHA512

      d17116bcc7c2eec73b8140c542179f03ec4cbf03d8dbb85594a5933e403f0396419fc458323b0c5bae33808c4d7a148cce90bda91bc703a1fa8fb21376a1a5de

    • SSDEEP

      24576:GIKq5dNtV7We2GWqerZwO7Fk8YxeU5F8Si5LO+rImHhAs4ew2Hk4Q:GI/NKeU1ZwO+eUv8Sima5u4

    • Modifies Windows Defender Real-time Protection settings

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks