General

  • Target

    e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a

  • Size

    745KB

  • Sample

    230425-fc7lfsge45

  • MD5

    6559f0415c8c2f416aad40654ff4c028

  • SHA1

    bfd1fe50dcfae70d062d73a2fabe43117f7197b2

  • SHA256

    e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a

  • SHA512

    8a6161ff5462e2550b11d68e65f77d5cbb67a2cbe4fa609a6636c935879e3eef2009bf5d8e5b8aabbac265b69f4a5be9de4cd0641db2be06d01fcfcce246c2b3

  • SSDEEP

    12288:Ay90mOYp08Dt86v4L4V66JIcF+e+9mVBtnX7iiF6QXv+Dg7MIre2:Ay9OYpDt3l68bXVnX+iHW0ASe2

Malware Config

Targets

    • Target

      e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a

    • Size

      745KB

    • MD5

      6559f0415c8c2f416aad40654ff4c028

    • SHA1

      bfd1fe50dcfae70d062d73a2fabe43117f7197b2

    • SHA256

      e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a

    • SHA512

      8a6161ff5462e2550b11d68e65f77d5cbb67a2cbe4fa609a6636c935879e3eef2009bf5d8e5b8aabbac265b69f4a5be9de4cd0641db2be06d01fcfcce246c2b3

    • SSDEEP

      12288:Ay90mOYp08Dt86v4L4V66JIcF+e+9mVBtnX7iiF6QXv+Dg7MIre2:Ay9OYpDt3l68bXVnX+iHW0ASe2

    • Modifies Windows Defender Real-time Protection settings

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks