General

  • Target

    b9861f0a8040cd0e8d963ec37c01bf22c5d04a6c90b4b107f5532fd782c54b23

  • Size

    1.1MB

  • Sample

    230426-ha2crshd9z

  • MD5

    03748f656fc25351bc31d5ae920e5288

  • SHA1

    abcd10b5737a9b378f0e8df76fcccd75cca3812f

  • SHA256

    b9861f0a8040cd0e8d963ec37c01bf22c5d04a6c90b4b107f5532fd782c54b23

  • SHA512

    26b530d1eecacdb8f92b47dfa11c1023849339a55b3b09b9c20074302063a757cbafadc380413e26904b6919d40d87ece9fdc9fbfebc113bfd4aa0d16fb81a6d

  • SSDEEP

    12288:jy90T3y0F2hu3yiXVJOaZvrZ8OyqV7USco9qBeZvq+z2NbhBuKfs3QbeEv7wNTRp:jyED+qTlTMqRUS5YNUkQuee7aMi

Malware Config

Targets

    • Target

      b9861f0a8040cd0e8d963ec37c01bf22c5d04a6c90b4b107f5532fd782c54b23

    • Size

      1.1MB

    • MD5

      03748f656fc25351bc31d5ae920e5288

    • SHA1

      abcd10b5737a9b378f0e8df76fcccd75cca3812f

    • SHA256

      b9861f0a8040cd0e8d963ec37c01bf22c5d04a6c90b4b107f5532fd782c54b23

    • SHA512

      26b530d1eecacdb8f92b47dfa11c1023849339a55b3b09b9c20074302063a757cbafadc380413e26904b6919d40d87ece9fdc9fbfebc113bfd4aa0d16fb81a6d

    • SSDEEP

      12288:jy90T3y0F2hu3yiXVJOaZvrZ8OyqV7USco9qBeZvq+z2NbhBuKfs3QbeEv7wNTRp:jyED+qTlTMqRUS5YNUkQuee7aMi

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks