General

  • Target

    f34ae9675db679exeexeexeex.exe

  • Size

    2.0MB

  • Sample

    230711-mz3z4shf6x

  • MD5

    f34ae9675db679eb73bd650e389b2cfa

  • SHA1

    b094f7be8f3930e346c3f8b8db328d82db3d8098

  • SHA256

    8a320ee16acabd436e2c3dc38de4a6d1c995678a49939293e7ce8623b2c60842

  • SHA512

    5332ca93aeebcc6aafe7300f1e65baf44ab07b0e8dd915a4b136d92b63604267cd795b66036ba14bc4a13a3949045485bbca70d4960a485d9479394b123b14ad

  • SSDEEP

    24576:WhugN2/YRBB7GOec7pAyKWZdyYgKyyd+WKmsUccoaTpzWvsv7BvPOdb/Pf0iyxhL:03N2GB577pAyKayYWGisTBvZxsC

Malware Config

Targets

    • Target

      f34ae9675db679exeexeexeex.exe

    • Size

      2.0MB

    • MD5

      f34ae9675db679eb73bd650e389b2cfa

    • SHA1

      b094f7be8f3930e346c3f8b8db328d82db3d8098

    • SHA256

      8a320ee16acabd436e2c3dc38de4a6d1c995678a49939293e7ce8623b2c60842

    • SHA512

      5332ca93aeebcc6aafe7300f1e65baf44ab07b0e8dd915a4b136d92b63604267cd795b66036ba14bc4a13a3949045485bbca70d4960a485d9479394b123b14ad

    • SSDEEP

      24576:WhugN2/YRBB7GOec7pAyKWZdyYgKyyd+WKmsUccoaTpzWvsv7BvPOdb/Pf0iyxhL:03N2GB577pAyKayYWGisTBvZxsC

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks