General

  • Target

    808c965f9bd935da2dd1f39babb4b6af655c621191a1a42a0a1eae47bba0eea0

  • Size

    7.2MB

  • Sample

    230517-fenw5acg6y

  • MD5

    b12b179341e1602735bb761f6aea1bd7

  • SHA1

    2a826f81c3201a79e74f8851cf71b6149d91ccc0

  • SHA256

    808c965f9bd935da2dd1f39babb4b6af655c621191a1a42a0a1eae47bba0eea0

  • SHA512

    ed7decc3a6fd1d452563f4de4fba4d8360451c3bcc3bb4f661377f89b11a96cc38250bd18fb988a0886a71c45c8f1cf131cf4f461c9c3b85591982c9ec323306

  • SSDEEP

    196608:P1OyZeFYUuaMmcslwSvIci+/WGMk2PF0q7R/LUwqrA9:tOhaUxMmc8wbYWyq7R4wqrA9

Malware Config

Targets

    • Target

      808c965f9bd935da2dd1f39babb4b6af655c621191a1a42a0a1eae47bba0eea0

    • Size

      7.2MB

    • MD5

      b12b179341e1602735bb761f6aea1bd7

    • SHA1

      2a826f81c3201a79e74f8851cf71b6149d91ccc0

    • SHA256

      808c965f9bd935da2dd1f39babb4b6af655c621191a1a42a0a1eae47bba0eea0

    • SHA512

      ed7decc3a6fd1d452563f4de4fba4d8360451c3bcc3bb4f661377f89b11a96cc38250bd18fb988a0886a71c45c8f1cf131cf4f461c9c3b85591982c9ec323306

    • SSDEEP

      196608:P1OyZeFYUuaMmcslwSvIci+/WGMk2PF0q7R/LUwqrA9:tOhaUxMmc8wbYWyq7R4wqrA9

    • Modifies Windows Defender Real-time Protection settings

    • Windows security bypass

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks