General

  • Target

    d2a65d090caa53ddb33eb2c3f9ad2f07c7c3e4591e0cc9a20f74f33b4ba0ac31

  • Size

    747KB

  • Sample

    230425-ar46zsfd89

  • MD5

    6bd0a023e965518e8ef286ae4976e4fb

  • SHA1

    f964427976fb2a336005555b69f694f7ec12b46a

  • SHA256

    d2a65d090caa53ddb33eb2c3f9ad2f07c7c3e4591e0cc9a20f74f33b4ba0ac31

  • SHA512

    a3e0a06578aff2bafa5e28fcf34678b332d33690775f19958c5d45f95024341808d33b58201bf3280fd9e6a4edcf6b2f57307942edbc5ffbe1a43677f017f2ab

  • SSDEEP

    12288:ry90LfmuIYIFiv3o4im7vsW1YE7mTkizJlx4MNPmRYFYkQdNl0c35h9:ryguuIYIFxYQeYE7mThHjNPgYFYbMs5b

Malware Config

Targets

    • Target

      d2a65d090caa53ddb33eb2c3f9ad2f07c7c3e4591e0cc9a20f74f33b4ba0ac31

    • Size

      747KB

    • MD5

      6bd0a023e965518e8ef286ae4976e4fb

    • SHA1

      f964427976fb2a336005555b69f694f7ec12b46a

    • SHA256

      d2a65d090caa53ddb33eb2c3f9ad2f07c7c3e4591e0cc9a20f74f33b4ba0ac31

    • SHA512

      a3e0a06578aff2bafa5e28fcf34678b332d33690775f19958c5d45f95024341808d33b58201bf3280fd9e6a4edcf6b2f57307942edbc5ffbe1a43677f017f2ab

    • SSDEEP

      12288:ry90LfmuIYIFiv3o4im7vsW1YE7mTkizJlx4MNPmRYFYkQdNl0c35h9:ryguuIYIFxYQeYE7mThHjNPgYFYbMs5b

    • Modifies Windows Defender Real-time Protection settings

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks