General

  • Target

    6acf13dfe045fb_JC.exe

  • Size

    252KB

  • Sample

    230716-nrfqaaef27

  • MD5

    6acf13dfe045fb6c633201f698a2098a

  • SHA1

    2136d1942baf861fc43902734c820ae4f2a2c015

  • SHA256

    e1c4d11bd5de8bbfd382f5ed389670e7e88c4b62b1be3b4636ca8c143bd225ac

  • SHA512

    e3393659ee5fd82194a7736e59340d82fb8983ea26d88847bebf14b2058a9be12a604ad43653df854b435f5b2ee20380ef7aaa4ad7e3ad97e0245f8c91278b3a

  • SSDEEP

    6144:opsCe8clEwjwPChEiVLNVxQCCWnNMtvcDxKo:op28WEyCChE+LfxevcDx

Malware Config

Targets

    • Target

      6acf13dfe045fb_JC.exe

    • Size

      252KB

    • MD5

      6acf13dfe045fb6c633201f698a2098a

    • SHA1

      2136d1942baf861fc43902734c820ae4f2a2c015

    • SHA256

      e1c4d11bd5de8bbfd382f5ed389670e7e88c4b62b1be3b4636ca8c143bd225ac

    • SHA512

      e3393659ee5fd82194a7736e59340d82fb8983ea26d88847bebf14b2058a9be12a604ad43653df854b435f5b2ee20380ef7aaa4ad7e3ad97e0245f8c91278b3a

    • SSDEEP

      6144:opsCe8clEwjwPChEiVLNVxQCCWnNMtvcDxKo:op28WEyCChE+LfxevcDx

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks