General

  • Target

    ADZP 20 Complex.py

  • Size

    28KB

  • Sample

    230609-1vmzzsed3w

  • MD5

    2dbf1780edd3db66a44515532d134082

  • SHA1

    1f66afcf0fe62fe54a31b3137894c6f2a478990a

  • SHA256

    75566d0afb5a23aab130933ff75b6b932bb4fd4b5606bf4463e20ba4f5e1e49b

  • SHA512

    e44a00ac40588d0a920c5983ea29af0c6b8e7b1e6594bddc96d7fb7670572856ed7d837191d6bffc739b6f149a27e2adec2529d47008d93decc75991527c7e9c

  • SSDEEP

    384:0OalBvibjapET2V1IAPR6vzkiqkP4BhNRl9FhyfQw:wlW6V1IAPgvzki1wBh3jIQw

Malware Config

Targets

    • Target

      ADZP 20 Complex.py

    • Size

      28KB

    • MD5

      2dbf1780edd3db66a44515532d134082

    • SHA1

      1f66afcf0fe62fe54a31b3137894c6f2a478990a

    • SHA256

      75566d0afb5a23aab130933ff75b6b932bb4fd4b5606bf4463e20ba4f5e1e49b

    • SHA512

      e44a00ac40588d0a920c5983ea29af0c6b8e7b1e6594bddc96d7fb7670572856ed7d837191d6bffc739b6f149a27e2adec2529d47008d93decc75991527c7e9c

    • SSDEEP

      384:0OalBvibjapET2V1IAPR6vzkiqkP4BhNRl9FhyfQw:wlW6V1IAPgvzki1wBh3jIQw

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

5
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks