General

  • Target

    ac1ce0ab85be8efab2eea978cf35e9808ce2cc1051592f7896c933c09e2ec4d1

  • Size

    376KB

  • Sample

    230505-fxq47sge34

  • MD5

    2de9a6cf6b6bac1d8e0e75e277652384

  • SHA1

    ef61f0893f30bf21851e7561e5d9f23458d10f77

  • SHA256

    ac1ce0ab85be8efab2eea978cf35e9808ce2cc1051592f7896c933c09e2ec4d1

  • SHA512

    c778d9365be3ce4d4e695d67d2a8a103e18b15fce669a15c668fb926651231991d2f736d44c099b266d16ed2b376d3e4de6ab6b80ac93167dea514db7c87cfcc

  • SSDEEP

    6144:KPy+bnr+Xp0yN90QEdIjwz1u4W2KxBUO6twZBeJ8CrnSM2/qRsDCLmuaZ8AUB9t4:JMrXy90GKwEKDUHxjn92/csYraCJ4

Malware Config

Targets

    • Target

      ac1ce0ab85be8efab2eea978cf35e9808ce2cc1051592f7896c933c09e2ec4d1

    • Size

      376KB

    • MD5

      2de9a6cf6b6bac1d8e0e75e277652384

    • SHA1

      ef61f0893f30bf21851e7561e5d9f23458d10f77

    • SHA256

      ac1ce0ab85be8efab2eea978cf35e9808ce2cc1051592f7896c933c09e2ec4d1

    • SHA512

      c778d9365be3ce4d4e695d67d2a8a103e18b15fce669a15c668fb926651231991d2f736d44c099b266d16ed2b376d3e4de6ab6b80ac93167dea514db7c87cfcc

    • SSDEEP

      6144:KPy+bnr+Xp0yN90QEdIjwz1u4W2KxBUO6twZBeJ8CrnSM2/qRsDCLmuaZ8AUB9t4:JMrXy90GKwEKDUHxjn92/csYraCJ4

    • Modifies Windows Defender Real-time Protection settings

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks