General

  • Target

    7894f9295b1350c3a0acef28c116025498973777a44a9afa1c1d13c5b178cde1

  • Size

    708KB

  • Sample

    230504-p196xsec2t

  • MD5

    07368d8d7e4893c4860654340adaecd2

  • SHA1

    960ed2790f12bbdaf19bf7b46ccf8b60f6ab4fac

  • SHA256

    7894f9295b1350c3a0acef28c116025498973777a44a9afa1c1d13c5b178cde1

  • SHA512

    64c7282e59f319e2bf4dbcbc21eabd721df1a307016fcbbc3d6bcb5798da0b24f0f947b31a74307989be24bfca2a5910eeaf1b7535c6ba4f3bb8e520e928e177

  • SSDEEP

    12288:PMrvy90llUt7zJmkaF9UFF7XCh4BlqVTy/kUe8wnjpZ3rRAu+9Dvezm4LN:8yF8kaFSFFjCh4+VTy/kUU14DMPLN

Malware Config

Targets

    • Target

      7894f9295b1350c3a0acef28c116025498973777a44a9afa1c1d13c5b178cde1

    • Size

      708KB

    • MD5

      07368d8d7e4893c4860654340adaecd2

    • SHA1

      960ed2790f12bbdaf19bf7b46ccf8b60f6ab4fac

    • SHA256

      7894f9295b1350c3a0acef28c116025498973777a44a9afa1c1d13c5b178cde1

    • SHA512

      64c7282e59f319e2bf4dbcbc21eabd721df1a307016fcbbc3d6bcb5798da0b24f0f947b31a74307989be24bfca2a5910eeaf1b7535c6ba4f3bb8e520e928e177

    • SSDEEP

      12288:PMrvy90llUt7zJmkaF9UFF7XCh4BlqVTy/kUe8wnjpZ3rRAu+9Dvezm4LN:8yF8kaFSFFjCh4+VTy/kUU14DMPLN

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks