General

  • Target

    67cdfb3fb8c4a5e09785111f2038b9391b27895e0bb5a14e073bf36b6e00dfde

  • Size

    707KB

  • Sample

    230504-qtyd8aed9x

  • MD5

    43adb7151d4964971ac98569a52cd61e

  • SHA1

    09b119817510c07bfa3e6ebfa972c51f507e021f

  • SHA256

    67cdfb3fb8c4a5e09785111f2038b9391b27895e0bb5a14e073bf36b6e00dfde

  • SHA512

    5ac5df075bcc2f7ade47162700ee177bede657b90f7ea8b06eb3ff4c27c4a6efd65b7172b03ea60c1a9a5171c8fb74fc03a1c163157f3ec6b936ce3616340ea9

  • SSDEEP

    12288:iMrry90hF0qk0ttYmB1uwS16WWikynUMCUzZc+AO8vf/uXHiF8LjAoFtVigqGQ:ByS0on/ShdVZc+AOuoCWLjAoF+gqR

Malware Config

Targets

    • Target

      67cdfb3fb8c4a5e09785111f2038b9391b27895e0bb5a14e073bf36b6e00dfde

    • Size

      707KB

    • MD5

      43adb7151d4964971ac98569a52cd61e

    • SHA1

      09b119817510c07bfa3e6ebfa972c51f507e021f

    • SHA256

      67cdfb3fb8c4a5e09785111f2038b9391b27895e0bb5a14e073bf36b6e00dfde

    • SHA512

      5ac5df075bcc2f7ade47162700ee177bede657b90f7ea8b06eb3ff4c27c4a6efd65b7172b03ea60c1a9a5171c8fb74fc03a1c163157f3ec6b936ce3616340ea9

    • SSDEEP

      12288:iMrry90hF0qk0ttYmB1uwS16WWikynUMCUzZc+AO8vf/uXHiF8LjAoFtVigqGQ:ByS0on/ShdVZc+AOuoCWLjAoF+gqR

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks