General

  • Target

    60710c4e2c9b387fc747d908c7f97262.exe

  • Size

    480KB

  • Sample

    230505-xbq1ragd6s

  • MD5

    60710c4e2c9b387fc747d908c7f97262

  • SHA1

    a88c96fcb8dcebd06d59867b95e48ea7cc97a51d

  • SHA256

    6d8fdff972dad65a243dcaa32f05c0f6318a43307a8082d509722b3eae86d072

  • SHA512

    bdaec37359e84f5d08ee25b72b429ee01a11c3273d5e9056a977c18ee0868bf57e3b0fff103f55e48d0e0d4b6ae02de18cfd156912cc15a14494c38cac64a29a

  • SSDEEP

    12288:5Mriy90OIdgEw+q8MTHYuqytvJcf1DdowOCES:Ty4I+PMMDiGES

Malware Config

Targets

    • Target

      60710c4e2c9b387fc747d908c7f97262.exe

    • Size

      480KB

    • MD5

      60710c4e2c9b387fc747d908c7f97262

    • SHA1

      a88c96fcb8dcebd06d59867b95e48ea7cc97a51d

    • SHA256

      6d8fdff972dad65a243dcaa32f05c0f6318a43307a8082d509722b3eae86d072

    • SHA512

      bdaec37359e84f5d08ee25b72b429ee01a11c3273d5e9056a977c18ee0868bf57e3b0fff103f55e48d0e0d4b6ae02de18cfd156912cc15a14494c38cac64a29a

    • SSDEEP

      12288:5Mriy90OIdgEw+q8MTHYuqytvJcf1DdowOCES:Ty4I+PMMDiGES

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks