General

  • Target

    03486810ae4e24c6532938d0c5a5a4ecc13a4f6bfaf0d8b4367b88922d67e6dd

  • Size

    479KB

  • Sample

    230506-jgp4ragd82

  • MD5

    973bb318f1df1f635491077188ac5e4b

  • SHA1

    3e59a536851d015cf186b5e756a8ee60d0aa9bfc

  • SHA256

    03486810ae4e24c6532938d0c5a5a4ecc13a4f6bfaf0d8b4367b88922d67e6dd

  • SHA512

    c57bf5fce21e3866f0bbec8d1e86755c277c989ecbeb80eb124ec86eed5b228c94835ccd6e1d188537e90375d83f120965e1c4487c7a8b68f3eb838f32fc4f35

  • SSDEEP

    12288:bMrjty90OZ13IXn7rWGsdLfBMdd/uST1a7Cfx:0tyTU7rWGmLSdwSxR5

Malware Config

Targets

    • Target

      03486810ae4e24c6532938d0c5a5a4ecc13a4f6bfaf0d8b4367b88922d67e6dd

    • Size

      479KB

    • MD5

      973bb318f1df1f635491077188ac5e4b

    • SHA1

      3e59a536851d015cf186b5e756a8ee60d0aa9bfc

    • SHA256

      03486810ae4e24c6532938d0c5a5a4ecc13a4f6bfaf0d8b4367b88922d67e6dd

    • SHA512

      c57bf5fce21e3866f0bbec8d1e86755c277c989ecbeb80eb124ec86eed5b228c94835ccd6e1d188537e90375d83f120965e1c4487c7a8b68f3eb838f32fc4f35

    • SSDEEP

      12288:bMrjty90OZ13IXn7rWGsdLfBMdd/uST1a7Cfx:0tyTU7rWGmLSdwSxR5

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks