General

  • Target

    NA_0137617edfd5e2exe_JC.exe

  • Size

    237KB

  • Sample

    230722-1nafbacb97

  • MD5

    0137617edfd5e23268af612e9229dc41

  • SHA1

    b1b962f308f9a0155138b96fbb30b7a82e90f194

  • SHA256

    a08e42b3763d3864cc8b6d8bbe13b6301a0f41ae3392acbedff9ae4395c99480

  • SHA512

    c785e0f078835bee68203846cdc53203bd0828682622b7cb7ec9310de9ba4140845f939a2e4fd4107dc495e02ece9c6b84247d999fc35a66b9d70fe1a9f9a27b

  • SSDEEP

    6144:ouT5KpAgyYGFQygE4qNpyx0+aRulY555iM:D1K+gyYGFCNC+CuK//

Malware Config

Targets

    • Target

      NA_0137617edfd5e2exe_JC.exe

    • Size

      237KB

    • MD5

      0137617edfd5e23268af612e9229dc41

    • SHA1

      b1b962f308f9a0155138b96fbb30b7a82e90f194

    • SHA256

      a08e42b3763d3864cc8b6d8bbe13b6301a0f41ae3392acbedff9ae4395c99480

    • SHA512

      c785e0f078835bee68203846cdc53203bd0828682622b7cb7ec9310de9ba4140845f939a2e4fd4107dc495e02ece9c6b84247d999fc35a66b9d70fe1a9f9a27b

    • SSDEEP

      6144:ouT5KpAgyYGFQygE4qNpyx0+aRulY555iM:D1K+gyYGFCNC+CuK//

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks