General

  • Target

    fffa50090afe37exe_JC.exe

  • Size

    303KB

  • Sample

    230719-ws36zaae38

  • MD5

    fffa50090afe3799981d242c0f73c6cb

  • SHA1

    98d50928b86d9d0ac2e1e23000ea9561f93277f8

  • SHA256

    4211cd0a1302f61e3a373feae5c2e365d1bfd934b7ec3ee8b1b93948beaacf5d

  • SHA512

    c7812876810bfbaec6ca6aa7bdb9409eb6b5f47ccd71ee974233e952b26fe35f0a2caa68b6d5346da507a72f51c31acf470fb3080d06e4f64f42be72e24abdde

  • SSDEEP

    6144:n31iWyJnThZJC428z0TEBQ7WHRfcCezfGOH:31DyJnPjz0d7CRKGi

Malware Config

Targets

    • Target

      fffa50090afe37exe_JC.exe

    • Size

      303KB

    • MD5

      fffa50090afe3799981d242c0f73c6cb

    • SHA1

      98d50928b86d9d0ac2e1e23000ea9561f93277f8

    • SHA256

      4211cd0a1302f61e3a373feae5c2e365d1bfd934b7ec3ee8b1b93948beaacf5d

    • SHA512

      c7812876810bfbaec6ca6aa7bdb9409eb6b5f47ccd71ee974233e952b26fe35f0a2caa68b6d5346da507a72f51c31acf470fb3080d06e4f64f42be72e24abdde

    • SSDEEP

      6144:n31iWyJnThZJC428z0TEBQ7WHRfcCezfGOH:31DyJnPjz0d7CRKGi

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks