General

  • Target

    NA_NA_3cd0e01f6ad47fexeexe_JC.exe

  • Size

    631KB

  • Sample

    230724-qg418sea3s

  • MD5

    3cd0e01f6ad47fd5d9a7218c0041856d

  • SHA1

    cff2453fb9d077823d1298dbe43f008babaa197a

  • SHA256

    8614ba901b6e0886985142b3da4d85580cc889fab5774397b2f712e5b591b263

  • SHA512

    91a380ee9c0f0589244b8d13068d95b652b3e677a23f809040c3cf23028fb71f97d12cc3ecaa08ec5a88f455ae5f637c7ec662c14fbe3e2b589f4eca42df7b02

  • SSDEEP

    12288:N2vgvAZJEsOWWpaAPfPg/ozSrWETp31F4hq5mJcMZMGrvWnV:NEr1WptfPnzK1FW22HMT

Malware Config

Targets

    • Target

      NA_NA_3cd0e01f6ad47fexeexe_JC.exe

    • Size

      631KB

    • MD5

      3cd0e01f6ad47fd5d9a7218c0041856d

    • SHA1

      cff2453fb9d077823d1298dbe43f008babaa197a

    • SHA256

      8614ba901b6e0886985142b3da4d85580cc889fab5774397b2f712e5b591b263

    • SHA512

      91a380ee9c0f0589244b8d13068d95b652b3e677a23f809040c3cf23028fb71f97d12cc3ecaa08ec5a88f455ae5f637c7ec662c14fbe3e2b589f4eca42df7b02

    • SSDEEP

      12288:N2vgvAZJEsOWWpaAPfPg/ozSrWETp31F4hq5mJcMZMGrvWnV:NEr1WptfPnzK1FW22HMT

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks