General

  • Target

    4a6924ca499e22fe8b0419e8f189096782b21679d5bedcb0cab1be679dd29962

  • Size

    1.1MB

  • Sample

    230425-23l84ade86

  • MD5

    c3140e351badb2321a8651ba13e44178

  • SHA1

    0e8418fbb2abbc0901acb14cfe831d653be0ad32

  • SHA256

    4a6924ca499e22fe8b0419e8f189096782b21679d5bedcb0cab1be679dd29962

  • SHA512

    ddd1f6fba20ea72d70773059a85b9f510adcc840963873626fbf1fb948ed6046666c0d0ed5f9b3538d801d77dafe8b6b6e7adf0428ca11409767feaea3800580

  • SSDEEP

    12288:Ly90LnMO/v2n0g/3KL/5i2C4bMVXQtQ1ZGIduhseBFj/yhhFcMA61u8Xxk1Rq6Sr:Ly8nMyXg/Mw1ZF+DhgFxk0bZqJQ

Malware Config

Targets

    • Target

      4a6924ca499e22fe8b0419e8f189096782b21679d5bedcb0cab1be679dd29962

    • Size

      1.1MB

    • MD5

      c3140e351badb2321a8651ba13e44178

    • SHA1

      0e8418fbb2abbc0901acb14cfe831d653be0ad32

    • SHA256

      4a6924ca499e22fe8b0419e8f189096782b21679d5bedcb0cab1be679dd29962

    • SHA512

      ddd1f6fba20ea72d70773059a85b9f510adcc840963873626fbf1fb948ed6046666c0d0ed5f9b3538d801d77dafe8b6b6e7adf0428ca11409767feaea3800580

    • SSDEEP

      12288:Ly90LnMO/v2n0g/3KL/5i2C4bMVXQtQ1ZGIduhseBFj/yhhFcMA61u8Xxk1Rq6Sr:Ly8nMyXg/Mw1ZF+DhgFxk0bZqJQ

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks