General

  • Target

    3f690f3d5e39d163b4b0caf0c0e1787dcca918f0ef75ba43ae6bdf16a68bd39a

  • Size

    376KB

  • Sample

    230505-pncd5acd2y

  • MD5

    3a9e14b60302e40763c8d6aa0de2a12b

  • SHA1

    5559c97499847472640b4b91059b02c560623d23

  • SHA256

    3f690f3d5e39d163b4b0caf0c0e1787dcca918f0ef75ba43ae6bdf16a68bd39a

  • SHA512

    ab494f225c1d536b69c7a8c89736b62c514cfde91a38afffa5b35f393d06e71992f3ccf3a3d454985fbfcf0aca6d19f9ae83a994f3c47425ee732514aca0d073

  • SSDEEP

    6144:KFy+bnr+Bp0yN90QEEHtxrXZDUCw5KJ0Pwq0Xxo7bWdQphbHW4:PMrhy90iHtx9yKuYq0+7K+ppHW4

Malware Config

Targets

    • Target

      3f690f3d5e39d163b4b0caf0c0e1787dcca918f0ef75ba43ae6bdf16a68bd39a

    • Size

      376KB

    • MD5

      3a9e14b60302e40763c8d6aa0de2a12b

    • SHA1

      5559c97499847472640b4b91059b02c560623d23

    • SHA256

      3f690f3d5e39d163b4b0caf0c0e1787dcca918f0ef75ba43ae6bdf16a68bd39a

    • SHA512

      ab494f225c1d536b69c7a8c89736b62c514cfde91a38afffa5b35f393d06e71992f3ccf3a3d454985fbfcf0aca6d19f9ae83a994f3c47425ee732514aca0d073

    • SSDEEP

      6144:KFy+bnr+Bp0yN90QEEHtxrXZDUCw5KJ0Pwq0Xxo7bWdQphbHW4:PMrhy90iHtx9yKuYq0+7K+ppHW4

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks