General

  • Target

    c53c092089ab85_JC.exe

  • Size

    245KB

  • Sample

    230718-th6s1acg5x

  • MD5

    c53c092089ab85d8854bf5d66d53fcbc

  • SHA1

    4813169600a2e76373392d704aaf48c73a4c2fc1

  • SHA256

    9006a321a4b39ea4288ba9e2c951eca18b6ed2c3bafcb259babf0297bb3d7289

  • SHA512

    47243c3d0a739ff42ebf042edb925bf6bf62b36d770dd616b9615eb8b0a65fe825d7508bc038418e8aeb8b9617c6760662343a62aecb26e8c5f7171af2438cdd

  • SSDEEP

    6144:heYvqHehD1ngC5SMLlN6AaxhAHEmXtxUE6aTk81Pz:8jHWD1ngyLWzbmbpA6z

Malware Config

Targets

    • Target

      c53c092089ab85_JC.exe

    • Size

      245KB

    • MD5

      c53c092089ab85d8854bf5d66d53fcbc

    • SHA1

      4813169600a2e76373392d704aaf48c73a4c2fc1

    • SHA256

      9006a321a4b39ea4288ba9e2c951eca18b6ed2c3bafcb259babf0297bb3d7289

    • SHA512

      47243c3d0a739ff42ebf042edb925bf6bf62b36d770dd616b9615eb8b0a65fe825d7508bc038418e8aeb8b9617c6760662343a62aecb26e8c5f7171af2438cdd

    • SSDEEP

      6144:heYvqHehD1ngC5SMLlN6AaxhAHEmXtxUE6aTk81Pz:8jHWD1ngyLWzbmbpA6z

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks