General

  • Target

    19f68b53aa6f12c21d58ced621625f6c241f32e6b51a1aa3bb20eb5e55b465bf

  • Size

    1.0MB

  • Sample

    230425-j5m93abb7z

  • MD5

    de290d2e136e9502f9aea7cf0083a20b

  • SHA1

    509e08209a59709f5b68beff482959d9801ff738

  • SHA256

    19f68b53aa6f12c21d58ced621625f6c241f32e6b51a1aa3bb20eb5e55b465bf

  • SHA512

    b306ea133640d36e38110b50b1ec8a1d269d0071b456b90ea57e36245d447423a768ec2adaeaea6db817cb17de0a480ff770912f4a3003de4413baa64c97ff6b

  • SSDEEP

    24576:jCAYkSvuevX2o0Kjm4BNQyv39+v19w6NpkH+RQ0R4owkPiyFG7HEK:7StvX2ozjm4HFv3M0ckH+RocjFG

Malware Config

Targets

    • Target

      19f68b53aa6f12c21d58ced621625f6c241f32e6b51a1aa3bb20eb5e55b465bf

    • Size

      1.0MB

    • MD5

      de290d2e136e9502f9aea7cf0083a20b

    • SHA1

      509e08209a59709f5b68beff482959d9801ff738

    • SHA256

      19f68b53aa6f12c21d58ced621625f6c241f32e6b51a1aa3bb20eb5e55b465bf

    • SHA512

      b306ea133640d36e38110b50b1ec8a1d269d0071b456b90ea57e36245d447423a768ec2adaeaea6db817cb17de0a480ff770912f4a3003de4413baa64c97ff6b

    • SSDEEP

      24576:jCAYkSvuevX2o0Kjm4BNQyv39+v19w6NpkH+RQ0R4owkPiyFG7HEK:7StvX2ozjm4HFv3M0ckH+RocjFG

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks