General

  • Target

    4d75f52a4c3d1f4898de52744d00c13b2b883175aa821214c4b7038aec9e0e3c

  • Size

    1.1MB

  • Sample

    230425-tcga6abc72

  • MD5

    8af05f01478c3d4d7a51770293d1c8ee

  • SHA1

    969f9b72334c68815a346f0e2ce976390f4b0bb1

  • SHA256

    4d75f52a4c3d1f4898de52744d00c13b2b883175aa821214c4b7038aec9e0e3c

  • SHA512

    83179f8a7d52ff1ea6dbe7a572fcd6fef5ed1c828039ff522233c4d14dcb3d232a81b59285c5ea2d28c5a82ac4303d5a864b868e5522ee5f26c757530999815c

  • SSDEEP

    24576:jyOfouTL28CrgcRTctFuta+7J7r6/mgzLHBOK:2OQoPCzTcrul7Cmgk

Malware Config

Targets

    • Target

      4d75f52a4c3d1f4898de52744d00c13b2b883175aa821214c4b7038aec9e0e3c

    • Size

      1.1MB

    • MD5

      8af05f01478c3d4d7a51770293d1c8ee

    • SHA1

      969f9b72334c68815a346f0e2ce976390f4b0bb1

    • SHA256

      4d75f52a4c3d1f4898de52744d00c13b2b883175aa821214c4b7038aec9e0e3c

    • SHA512

      83179f8a7d52ff1ea6dbe7a572fcd6fef5ed1c828039ff522233c4d14dcb3d232a81b59285c5ea2d28c5a82ac4303d5a864b868e5522ee5f26c757530999815c

    • SSDEEP

      24576:jyOfouTL28CrgcRTctFuta+7J7r6/mgzLHBOK:2OQoPCzTcrul7Cmgk

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks