General

  • Target

    NA_NA_1e6e53ed590499exeexe_JC.exe

  • Size

    259KB

  • Sample

    230723-wbb16afd87

  • MD5

    1e6e53ed590499525f4e9a9aef9ad89c

  • SHA1

    cb13ba0144b30486b3582d22bff8c90a4f9e2bbb

  • SHA256

    61fe5a5ae9f75bcbed369a70c0d89a6af71b4907d4ff68b481e230ac66f2a98a

  • SHA512

    d893857f331711a8e5f1755bafd7c5d40eeaf2ef3bcbc14cfb3d08f66669ab0f2da3c4778fcc77590823ff66181590dbc18dfec0dfeeb9a765cea41c6e600199

  • SSDEEP

    6144:gJ8Fkehcn7WXlMM6oStKQa5e8PxleHo00N+rDZPLii+p:gGxJXbzSba5tYo00N+rDZzIp

Malware Config

Targets

    • Target

      NA_NA_1e6e53ed590499exeexe_JC.exe

    • Size

      259KB

    • MD5

      1e6e53ed590499525f4e9a9aef9ad89c

    • SHA1

      cb13ba0144b30486b3582d22bff8c90a4f9e2bbb

    • SHA256

      61fe5a5ae9f75bcbed369a70c0d89a6af71b4907d4ff68b481e230ac66f2a98a

    • SHA512

      d893857f331711a8e5f1755bafd7c5d40eeaf2ef3bcbc14cfb3d08f66669ab0f2da3c4778fcc77590823ff66181590dbc18dfec0dfeeb9a765cea41c6e600199

    • SSDEEP

      6144:gJ8Fkehcn7WXlMM6oStKQa5e8PxleHo00N+rDZPLii+p:gGxJXbzSba5tYo00N+rDZzIp

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks