General

  • Target

    17ddb4edf577c9143cab458936f7fa04

  • Size

    512KB

  • Sample

    231224-21ljsabbc4

  • MD5

    17ddb4edf577c9143cab458936f7fa04

  • SHA1

    3fcb06b9c98fe4d8aa4778c33a76353bcbf2af15

  • SHA256

    0f65f212348cc045f8cdd39ac4a2a63f626841eb02e7c50bd73b62567befcc3d

  • SHA512

    bfa99ecad681a5360ec3f2083b9640329a7d7f849173fa4d6c12f2526f9da29dc1dd9ce672f8e3c3cdd4b096559c9eb5f17187a9a2e8ed587c313437ce063a34

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6U:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm59

Malware Config

Targets

    • Target

      17ddb4edf577c9143cab458936f7fa04

    • Size

      512KB

    • MD5

      17ddb4edf577c9143cab458936f7fa04

    • SHA1

      3fcb06b9c98fe4d8aa4778c33a76353bcbf2af15

    • SHA256

      0f65f212348cc045f8cdd39ac4a2a63f626841eb02e7c50bd73b62567befcc3d

    • SHA512

      bfa99ecad681a5360ec3f2083b9640329a7d7f849173fa4d6c12f2526f9da29dc1dd9ce672f8e3c3cdd4b096559c9eb5f17187a9a2e8ed587c313437ce063a34

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6U:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm59

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks