General

  • Target

    NA_NA_22418b85a99399exeexe_JC.exe

  • Size

    191KB

  • Sample

    230723-wwmndsgc31

  • MD5

    22418b85a9939990645a0ea701d9b319

  • SHA1

    527372b5807339796d12562fcf3f0bd416d502d7

  • SHA256

    ee1ca0a8fe7234bb019b18bc61df207d8615cdba79437ca9983a2c8cb4279432

  • SHA512

    a297dee836682489a80ba51fe261901a18990c78883b33a799f2e280244db9bef8619d8715abfd3caa8143d9d68848d797cb2db71515e0d0414ee9686746f572

  • SSDEEP

    3072:s3ZF1JAGQaAquTM4OWcg64vZb86j+IwZd2Q911QwsSEoB0ipkOV3:iFJAnaEtOWcqqIPdwo1zOB

Malware Config

Targets

    • Target

      NA_NA_22418b85a99399exeexe_JC.exe

    • Size

      191KB

    • MD5

      22418b85a9939990645a0ea701d9b319

    • SHA1

      527372b5807339796d12562fcf3f0bd416d502d7

    • SHA256

      ee1ca0a8fe7234bb019b18bc61df207d8615cdba79437ca9983a2c8cb4279432

    • SHA512

      a297dee836682489a80ba51fe261901a18990c78883b33a799f2e280244db9bef8619d8715abfd3caa8143d9d68848d797cb2db71515e0d0414ee9686746f572

    • SSDEEP

      3072:s3ZF1JAGQaAquTM4OWcg64vZb86j+IwZd2Q911QwsSEoB0ipkOV3:iFJAnaEtOWcqqIPdwo1zOB

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks