General

  • Target

    5fcc766e74af12d58ac83937db3fd6acb42a09403314eafc6708c64ec7acbbc5

  • Size

    752KB

  • Sample

    230424-n8e53sdc8t

  • MD5

    3c164c45d0919ff19672f3699a3098ed

  • SHA1

    9e890f84218fd7942f316017e368896e8e59cbf1

  • SHA256

    5fcc766e74af12d58ac83937db3fd6acb42a09403314eafc6708c64ec7acbbc5

  • SHA512

    07af2d6824c6309b9bed26b45e629d44800187a54f0a080563c364aadc58533f469334454cc17c8936bb6c0f99e98c285e32b3ba2cab0b344bef6485e73fb0e1

  • SSDEEP

    12288:Gy90YCD9A8nsBbHLXbTtJ6di75Bylskbk3Y6BfLc3xd18uWp6V9G8hlX11S:GyF+9nsBbrLxJZ75QlskAo6BDQr8vCsB

Malware Config

Targets

    • Target

      5fcc766e74af12d58ac83937db3fd6acb42a09403314eafc6708c64ec7acbbc5

    • Size

      752KB

    • MD5

      3c164c45d0919ff19672f3699a3098ed

    • SHA1

      9e890f84218fd7942f316017e368896e8e59cbf1

    • SHA256

      5fcc766e74af12d58ac83937db3fd6acb42a09403314eafc6708c64ec7acbbc5

    • SHA512

      07af2d6824c6309b9bed26b45e629d44800187a54f0a080563c364aadc58533f469334454cc17c8936bb6c0f99e98c285e32b3ba2cab0b344bef6485e73fb0e1

    • SSDEEP

      12288:Gy90YCD9A8nsBbHLXbTtJ6di75Bylskbk3Y6BfLc3xd18uWp6V9G8hlX11S:GyF+9nsBbrLxJZ75QlskAo6BDQr8vCsB

    • Modifies Windows Defender Real-time Protection settings

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks