General

  • Target

    6da79d7da2bc8dc5f8fcb48dc7ff4b1fe04d095dc4bc3c4be142a2d765cde664

  • Size

    376KB

  • Sample

    230504-19kheafe24

  • MD5

    0f4c2bc1aa2eeb8200ec5af798caba29

  • SHA1

    432c8143421e61bba02e926c5a833c483b934234

  • SHA256

    6da79d7da2bc8dc5f8fcb48dc7ff4b1fe04d095dc4bc3c4be142a2d765cde664

  • SHA512

    a04da88344fecc9901acdf9ae248e2232e819ca87e16aa38c61ca190b8093e8cf5659b5ef55337b06b008bb4b9eb5cdc8ea46d97791871d293177edd277ceb16

  • SSDEEP

    6144:Kgy+bnr+lp0yN90QEzQg+DHJKSFAEyI0kKm3v9qMRQH6flzVtafDH07P/734HL:oMrly90xH+TJJnd3v8MRQIVtwDH0Dj4r

Malware Config

Targets

    • Target

      6da79d7da2bc8dc5f8fcb48dc7ff4b1fe04d095dc4bc3c4be142a2d765cde664

    • Size

      376KB

    • MD5

      0f4c2bc1aa2eeb8200ec5af798caba29

    • SHA1

      432c8143421e61bba02e926c5a833c483b934234

    • SHA256

      6da79d7da2bc8dc5f8fcb48dc7ff4b1fe04d095dc4bc3c4be142a2d765cde664

    • SHA512

      a04da88344fecc9901acdf9ae248e2232e819ca87e16aa38c61ca190b8093e8cf5659b5ef55337b06b008bb4b9eb5cdc8ea46d97791871d293177edd277ceb16

    • SSDEEP

      6144:Kgy+bnr+lp0yN90QEzQg+DHJKSFAEyI0kKm3v9qMRQH6flzVtafDH07P/734HL:oMrly90xH+TJJnd3v8MRQIVtwDH0Dj4r

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks