General

  • Target

    8305980883e4a837c663713cc417d851ef42ba987a90652084ae147dc99acb83

  • Size

    590KB

  • Sample

    230504-l16xqabe55

  • MD5

    108ac5435037fa97f5d871d3b92d4253

  • SHA1

    c8017a5e454f88aacb674db66a0d7ae3100515b5

  • SHA256

    8305980883e4a837c663713cc417d851ef42ba987a90652084ae147dc99acb83

  • SHA512

    5c289899d50438a65e3dee1474da5184bac009baf764119794916d3e61cbc32e6e7ad2b6aee778d6d1fcc7fdb31a438044776d3eab75a9fc65555cc595a2af27

  • SSDEEP

    12288:EMrQy90ojlT0UY9II3IctjrEI4sGyLNLsw+hQOHxEe:Uy90UwDtjQI4sGyLNltOREe

Malware Config

Targets

    • Target

      8305980883e4a837c663713cc417d851ef42ba987a90652084ae147dc99acb83

    • Size

      590KB

    • MD5

      108ac5435037fa97f5d871d3b92d4253

    • SHA1

      c8017a5e454f88aacb674db66a0d7ae3100515b5

    • SHA256

      8305980883e4a837c663713cc417d851ef42ba987a90652084ae147dc99acb83

    • SHA512

      5c289899d50438a65e3dee1474da5184bac009baf764119794916d3e61cbc32e6e7ad2b6aee778d6d1fcc7fdb31a438044776d3eab75a9fc65555cc595a2af27

    • SSDEEP

      12288:EMrQy90ojlT0UY9II3IctjrEI4sGyLNLsw+hQOHxEe:Uy90UwDtjQI4sGyLNltOREe

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks