Resubmissions

05/06/2023, 16:19

230605-tsga4aab5s 10

05/06/2023, 12:37

230605-ptf99sgf35 10

General

  • Target

    cc8638cd86f89b6713993edca48e37e9.bin

  • Size

    587KB

  • Sample

    230605-tsga4aab5s

  • MD5

    30b4235f130173ad81507618f103cb6a

  • SHA1

    22e985f20f6de14a01928958506237b4183bc159

  • SHA256

    60f9710d90abd5afa424c219ec72d9f957060373975e91b543e85594876f4a48

  • SHA512

    880a72c4f088072457f5259a7c04d834e931f9d376a9b2d4a5fc36721a728de3d43ce772486929ce173fcd608a9ec9dde6dabff4a35ecc17653ef367c0e01635

  • SSDEEP

    12288:qL5tJPC/5mOysyW8Iel0WoNeFTQ1xQq/UNrBZwHbRwsPc3qkPr:q0/5hyPVDoNQQPWrBSHtwT7

Malware Config

Targets

    • Target

      5593569a8cccb31bf93eaeee499c0af142d9c8ccf3b9169e6ddd24f7e81c95e0.exe

    • Size

      672KB

    • MD5

      cc8638cd86f89b6713993edca48e37e9

    • SHA1

      90b4da2d23d5df5d29f3a86e9f8383a435126213

    • SHA256

      5593569a8cccb31bf93eaeee499c0af142d9c8ccf3b9169e6ddd24f7e81c95e0

    • SHA512

      d9bceb56353ad4b4542fd1ce0237f3bd1b1542d3f7083b243dc1e435cad45f42aabd1a23e2db8c12db299b62ecce4db82a753e9458c6370354469e0b546281aa

    • SSDEEP

      12288:lLYA9TJRcNEFAl/uqzFEqiPTriluFeutSfzoK6e5Zn7qBbQGyVoKMdW:lfJSy2u0EqiHilAeutSfzoK6gZgsCa

    • UAC bypass

    • Windows security bypass

    • Find unpacked information stealer based on possible SQL query to retrieve broswer data

      Detects infostealer.

    • Downloads MZ/PE file

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks