General

  • Target

    df1212703394cd93bcc3aef488c610bcdbe1789ae4fe0c5d03fd1d0af9acb5c1

  • Size

    712KB

  • Sample

    230504-r8fy6afa3v

  • MD5

    f62af8a0b96f28030611f02205d09146

  • SHA1

    a06fbec9de82e676ec173e308d33ae0c4ed7ce54

  • SHA256

    df1212703394cd93bcc3aef488c610bcdbe1789ae4fe0c5d03fd1d0af9acb5c1

  • SHA512

    d87e931d4e991bb87c494ee847c6aa06af7074dd9c2ebf2af3896e39b1c93991eef51a4a8e2707cecc279129ab1c131ed0d4553780efe96ab4b004a9fba31d9f

  • SSDEEP

    12288:dMrDy90TkhXStXTetbeobNFCULUxc4gMOqfU2uNkU4fB2YGNcYny5:yyI4XMTexeobNFCmoIGfU2uGU4fBgJn

Malware Config

Targets

    • Target

      df1212703394cd93bcc3aef488c610bcdbe1789ae4fe0c5d03fd1d0af9acb5c1

    • Size

      712KB

    • MD5

      f62af8a0b96f28030611f02205d09146

    • SHA1

      a06fbec9de82e676ec173e308d33ae0c4ed7ce54

    • SHA256

      df1212703394cd93bcc3aef488c610bcdbe1789ae4fe0c5d03fd1d0af9acb5c1

    • SHA512

      d87e931d4e991bb87c494ee847c6aa06af7074dd9c2ebf2af3896e39b1c93991eef51a4a8e2707cecc279129ab1c131ed0d4553780efe96ab4b004a9fba31d9f

    • SSDEEP

      12288:dMrDy90TkhXStXTetbeobNFCULUxc4gMOqfU2uNkU4fB2YGNcYny5:yyI4XMTexeobNFCmoIGfU2uGU4fBgJn

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks