General

  • Target

    NA_NA_38a4cb33872c8dexeexe_JC.exe

  • Size

    192KB

  • Sample

    230723-zh5tlahc3s

  • MD5

    38a4cb33872c8dbbb96df34ebd5023e0

  • SHA1

    2d02e615bc275a7de881c39f46faef132d12fc0f

  • SHA256

    ff9c8dd7c1c3f4348f5d04d370fe9f06416bb39c448749e3e7eac1adc23bfaf2

  • SHA512

    5b2967245d9dc40c19fd1ee24ff89ade9256cff2442989c6b524113db9c114197f7a1ae8376863a0b0ae22965cbffd0e504385d3cd60642fa56370ca885c8a13

  • SSDEEP

    6144:MVs9SVBX/DO9JJZAy8T93Rlv2ee5ckQkuu/6LW:MjBvOJjAy85Rlv2ee5crk//d

Malware Config

Targets

    • Target

      NA_NA_38a4cb33872c8dexeexe_JC.exe

    • Size

      192KB

    • MD5

      38a4cb33872c8dbbb96df34ebd5023e0

    • SHA1

      2d02e615bc275a7de881c39f46faef132d12fc0f

    • SHA256

      ff9c8dd7c1c3f4348f5d04d370fe9f06416bb39c448749e3e7eac1adc23bfaf2

    • SHA512

      5b2967245d9dc40c19fd1ee24ff89ade9256cff2442989c6b524113db9c114197f7a1ae8376863a0b0ae22965cbffd0e504385d3cd60642fa56370ca885c8a13

    • SSDEEP

      6144:MVs9SVBX/DO9JJZAy8T93Rlv2ee5ckQkuu/6LW:MjBvOJjAy85Rlv2ee5crk//d

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks