General

  • Target

    a527e55382589144bf0307ec89201964aea3d99f32cfb037d4fcfbf4ff939429

  • Size

    376KB

  • Sample

    230505-aeny8shf2w

  • MD5

    fc0bcd7ec19d8d44c7174834f5135bac

  • SHA1

    e6bd31e3569509edf97ff25b40c6fa597fc4023b

  • SHA256

    a527e55382589144bf0307ec89201964aea3d99f32cfb037d4fcfbf4ff939429

  • SHA512

    460b34c9756f19060284b1b3bd91157ab7cc821cd1e1b2650e7d4772d970c71b75329434be99d9950db1204e048b9be26b25edd237c7fc58699f905dbb5c6472

  • SSDEEP

    6144:Kvy+bnr+ip0yN90QEKT//na15lPzgUb3c4WHmT7+nNCT8tOscMMvSb6H917Bki:dMrGy904/i5lbzc4WGT6nNCwM6b6bki

Malware Config

Targets

    • Target

      a527e55382589144bf0307ec89201964aea3d99f32cfb037d4fcfbf4ff939429

    • Size

      376KB

    • MD5

      fc0bcd7ec19d8d44c7174834f5135bac

    • SHA1

      e6bd31e3569509edf97ff25b40c6fa597fc4023b

    • SHA256

      a527e55382589144bf0307ec89201964aea3d99f32cfb037d4fcfbf4ff939429

    • SHA512

      460b34c9756f19060284b1b3bd91157ab7cc821cd1e1b2650e7d4772d970c71b75329434be99d9950db1204e048b9be26b25edd237c7fc58699f905dbb5c6472

    • SSDEEP

      6144:Kvy+bnr+ip0yN90QEKT//na15lPzgUb3c4WHmT7+nNCT8tOscMMvSb6H917Bki:dMrGy904/i5lbzc4WGT6nNCwM6b6bki

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks