General

  • Target

    e1ff7dac43f49f2ae564580f2644a2a9600fa86ec7996d9b6733016cee4634fb

  • Size

    599KB

  • Sample

    230504-mxqxrsbg73

  • MD5

    cd2bcd756c3b76ad8b0f9d0e1c8af4d7

  • SHA1

    6859904ddd1f0a31259f8429414bdefddba05d17

  • SHA256

    e1ff7dac43f49f2ae564580f2644a2a9600fa86ec7996d9b6733016cee4634fb

  • SHA512

    b63db6e7c682c549d7a7c05f072856b2fd12a2e53a6fb7c19df871cf9995053d58ec831952a93b6e052a7604dcf1850b012f3eec609accfed4f5a1377326af69

  • SSDEEP

    12288:OMrRy901RE3pkoX1Isj9Wl4Wkj5SGTE5cOJoErN16O:7y0RE3pkgao9y4Wk7TEOWrv

Malware Config

Targets

    • Target

      e1ff7dac43f49f2ae564580f2644a2a9600fa86ec7996d9b6733016cee4634fb

    • Size

      599KB

    • MD5

      cd2bcd756c3b76ad8b0f9d0e1c8af4d7

    • SHA1

      6859904ddd1f0a31259f8429414bdefddba05d17

    • SHA256

      e1ff7dac43f49f2ae564580f2644a2a9600fa86ec7996d9b6733016cee4634fb

    • SHA512

      b63db6e7c682c549d7a7c05f072856b2fd12a2e53a6fb7c19df871cf9995053d58ec831952a93b6e052a7604dcf1850b012f3eec609accfed4f5a1377326af69

    • SSDEEP

      12288:OMrRy901RE3pkoX1Isj9Wl4Wkj5SGTE5cOJoErN16O:7y0RE3pkgao9y4Wk7TEOWrv

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks