General

  • Target

    5b5e2c0c3b54166515b4a7bf784a91d824b7a3d547a55a8ad86aede5f08b41ea

  • Size

    600KB

  • Sample

    230504-rg619sch53

  • MD5

    70a2499831cee164ba017c2387931e69

  • SHA1

    2e64189906e0661f5281db82b605ebce1a63d276

  • SHA256

    5b5e2c0c3b54166515b4a7bf784a91d824b7a3d547a55a8ad86aede5f08b41ea

  • SHA512

    e0b66044de39e93d07cf281be1de89a4a319698a7df795ebba70192490d6856800806971f20bbd9cdd41f9eeecd69e9fba06b8347322b0a16ee055c05d7f0fe1

  • SSDEEP

    12288:HMrwy90DGtQl5X+UQAirgjA2IEgJdrHeVtbSp+9DaYPPtCg:jyMeGiMjkJdaSp+9p1Cg

Malware Config

Targets

    • Target

      5b5e2c0c3b54166515b4a7bf784a91d824b7a3d547a55a8ad86aede5f08b41ea

    • Size

      600KB

    • MD5

      70a2499831cee164ba017c2387931e69

    • SHA1

      2e64189906e0661f5281db82b605ebce1a63d276

    • SHA256

      5b5e2c0c3b54166515b4a7bf784a91d824b7a3d547a55a8ad86aede5f08b41ea

    • SHA512

      e0b66044de39e93d07cf281be1de89a4a319698a7df795ebba70192490d6856800806971f20bbd9cdd41f9eeecd69e9fba06b8347322b0a16ee055c05d7f0fe1

    • SSDEEP

      12288:HMrwy90DGtQl5X+UQAirgjA2IEgJdrHeVtbSp+9DaYPPtCg:jyMeGiMjkJdaSp+9p1Cg

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks