General

  • Target

    7ed1230414c3c363c09f99203c7ef44d65d8b0a9baaeaf2bfa4c39e3ee6b8d3b

  • Size

    1.0MB

  • Sample

    230426-rwhbfsbg5x

  • MD5

    c20b8c9e637d15f8a11d328e9615c459

  • SHA1

    68b2a87be54aebc82b101af22ceb51ff5e8dee34

  • SHA256

    7ed1230414c3c363c09f99203c7ef44d65d8b0a9baaeaf2bfa4c39e3ee6b8d3b

  • SHA512

    ef24eecbc2479739d2d49eccda56e52757f828517f83684c59c7116124a2f9a77e0d9b9a454f20f13e826d43ca16fbffa4f9bc6df322341de050fec890a00628

  • SSDEEP

    24576:oy1uYN/DNCb7thREfYvHIUcQ8/GJMEJK93KV+OjsXW8iRIC:v1LNIb7HSicd/vj3KV1oW8i

Malware Config

Targets

    • Target

      7ed1230414c3c363c09f99203c7ef44d65d8b0a9baaeaf2bfa4c39e3ee6b8d3b

    • Size

      1.0MB

    • MD5

      c20b8c9e637d15f8a11d328e9615c459

    • SHA1

      68b2a87be54aebc82b101af22ceb51ff5e8dee34

    • SHA256

      7ed1230414c3c363c09f99203c7ef44d65d8b0a9baaeaf2bfa4c39e3ee6b8d3b

    • SHA512

      ef24eecbc2479739d2d49eccda56e52757f828517f83684c59c7116124a2f9a77e0d9b9a454f20f13e826d43ca16fbffa4f9bc6df322341de050fec890a00628

    • SSDEEP

      24576:oy1uYN/DNCb7thREfYvHIUcQ8/GJMEJK93KV+OjsXW8iRIC:v1LNIb7HSicd/vj3KV1oW8i

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks