General

  • Target

    Screenshot 2023-04-19 12.14.59.png

  • Size

    130KB

  • Sample

    230921-q769aagd8s

  • MD5

    e5ce3294314d8b54d3ae0f56ff66d20c

  • SHA1

    e667cbc5d940e4de7488d2e8822f020651baafec

  • SHA256

    5d7d326c26dc915a62d5bd4e4b580f836dbb0018b243ddeccf6300aa5048b881

  • SHA512

    f8592063e4a9a2eeefbbb59712057a727173069424d4c99c4d641af65534fafba28a625709dbea362da23a9a9076f4bb99372b15772df78edbe8c227261fdb46

  • SSDEEP

    3072:W6H6Lt71gtUla5BBMSZCm2muONFv900PUN4zzzzPgzr/HK:WJhxgSa5oFZmuONx900onzrS

Malware Config

Targets

    • Target

      Screenshot 2023-04-19 12.14.59.png

    • Size

      130KB

    • MD5

      e5ce3294314d8b54d3ae0f56ff66d20c

    • SHA1

      e667cbc5d940e4de7488d2e8822f020651baafec

    • SHA256

      5d7d326c26dc915a62d5bd4e4b580f836dbb0018b243ddeccf6300aa5048b881

    • SHA512

      f8592063e4a9a2eeefbbb59712057a727173069424d4c99c4d641af65534fafba28a625709dbea362da23a9a9076f4bb99372b15772df78edbe8c227261fdb46

    • SSDEEP

      3072:W6H6Lt71gtUla5BBMSZCm2muONFv900PUN4zzzzPgzr/HK:WJhxgSa5oFZmuONx900onzrS

    • Downloads MZ/PE file

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks