General

  • Target

    c6cc56aa8b44da0bfcb03bfc237e238aaa694e1ddca560d94c5430b0c3bc8320

  • Size

    376KB

  • Sample

    230504-1y2mjshc3w

  • MD5

    226ebef289d183a186a2dcdaff6d9f10

  • SHA1

    8f6779fce4c761ad3ffb02107a61b205f3505cd3

  • SHA256

    c6cc56aa8b44da0bfcb03bfc237e238aaa694e1ddca560d94c5430b0c3bc8320

  • SHA512

    e13bba9acf435644b89c12e55784dd02e86fb23a9b33d5e0ebecfc5f26c2511202f46cbaa4f2c1337fb5b72d32315f97644ff1f22309f0baf883302a912e0c27

  • SSDEEP

    6144:KIy+bnr+Vp0yN90QEq9eQQAZtRYQsZA1CgFrHWYyjcMni8wi36xz1/krc7An60Ib:YMr9y90kVGTgtWdirF1/wPnnIb

Malware Config

Targets

    • Target

      c6cc56aa8b44da0bfcb03bfc237e238aaa694e1ddca560d94c5430b0c3bc8320

    • Size

      376KB

    • MD5

      226ebef289d183a186a2dcdaff6d9f10

    • SHA1

      8f6779fce4c761ad3ffb02107a61b205f3505cd3

    • SHA256

      c6cc56aa8b44da0bfcb03bfc237e238aaa694e1ddca560d94c5430b0c3bc8320

    • SHA512

      e13bba9acf435644b89c12e55784dd02e86fb23a9b33d5e0ebecfc5f26c2511202f46cbaa4f2c1337fb5b72d32315f97644ff1f22309f0baf883302a912e0c27

    • SSDEEP

      6144:KIy+bnr+Vp0yN90QEq9eQQAZtRYQsZA1CgFrHWYyjcMni8wi36xz1/krc7An60Ib:YMr9y90kVGTgtWdirF1/wPnnIb

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks