General

  • Target

    645724eb1ee095253cacdb975705262095ca7974d15537bc3bb902ce769b55f2

  • Size

    709KB

  • Sample

    230504-qa6lgsec7t

  • MD5

    ba6f32772dfb7d83ac59959e8c4791d6

  • SHA1

    437a81da42daa4560dd44737934ec7a7389b08c7

  • SHA256

    645724eb1ee095253cacdb975705262095ca7974d15537bc3bb902ce769b55f2

  • SHA512

    7064535768bea1571c389025efaec4cdffaa49afcdf935a035160caa9f9750a8e35151995ec61d3b02534db859b7e2e16b49b5a5b7ea92daad1ffb153408fcd4

  • SSDEEP

    12288:NMrjy90/bO30bxQxh5ioUZMqMEysaPsAP3rigbOAt4WmNaqw5jsNd:ayJEdQHEocMqMEy8kH/KWqaZRsr

Malware Config

Targets

    • Target

      645724eb1ee095253cacdb975705262095ca7974d15537bc3bb902ce769b55f2

    • Size

      709KB

    • MD5

      ba6f32772dfb7d83ac59959e8c4791d6

    • SHA1

      437a81da42daa4560dd44737934ec7a7389b08c7

    • SHA256

      645724eb1ee095253cacdb975705262095ca7974d15537bc3bb902ce769b55f2

    • SHA512

      7064535768bea1571c389025efaec4cdffaa49afcdf935a035160caa9f9750a8e35151995ec61d3b02534db859b7e2e16b49b5a5b7ea92daad1ffb153408fcd4

    • SSDEEP

      12288:NMrjy90/bO30bxQxh5ioUZMqMEysaPsAP3rigbOAt4WmNaqw5jsNd:ayJEdQHEocMqMEy8kH/KWqaZRsr

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks