General

  • Target

    150413642ad2a3exe_JC.exe

  • Size

    235KB

  • Sample

    230714-n4zzpaec71

  • MD5

    150413642ad2a3c46bbf7422eadba6f1

  • SHA1

    16e38d4085549122f54e837cdf6e3846afa4f189

  • SHA256

    85fc16bbcc793b67d827f8f6d156957404c06b4d8ed0ceedd557b869244aeb14

  • SHA512

    b5330fd479141d9620af7dca21d94e7acc89d40e139a9396f956688703f674cd01a7d977a70e052bd01ac9bdca3d29c6786cf7abac916fdaeefa1b1f77d6fc0a

  • SSDEEP

    6144:VZAxAq7Wp9nhtGCmFKEkdfPH8nEft8TDRYhRXKdIUNpXB6Uqjq:VUdWp9nhtGC4KLX8n7XRYjKdxNRBqjq

Malware Config

Targets

    • Target

      150413642ad2a3exe_JC.exe

    • Size

      235KB

    • MD5

      150413642ad2a3c46bbf7422eadba6f1

    • SHA1

      16e38d4085549122f54e837cdf6e3846afa4f189

    • SHA256

      85fc16bbcc793b67d827f8f6d156957404c06b4d8ed0ceedd557b869244aeb14

    • SHA512

      b5330fd479141d9620af7dca21d94e7acc89d40e139a9396f956688703f674cd01a7d977a70e052bd01ac9bdca3d29c6786cf7abac916fdaeefa1b1f77d6fc0a

    • SSDEEP

      6144:VZAxAq7Wp9nhtGCmFKEkdfPH8nEft8TDRYhRXKdIUNpXB6Uqjq:VUdWp9nhtGC4KLX8n7XRYjKdxNRBqjq

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks