General

  • Target

    06c73b612212a1f2e1f7bb3cec148820

  • Size

    512KB

  • Sample

    231224-vesyeadhfn

  • MD5

    06c73b612212a1f2e1f7bb3cec148820

  • SHA1

    352b9262894d045be6f743a382905f566f9c0dfd

  • SHA256

    87a6780865f90a110b2e39fcda91d7cfa34e748b03a712d8170dd59a2194bedc

  • SHA512

    8ebf7d37a47e20dfec0397df7a5c5821cd53af182d31c5db24cf7cecb57ca647d7733bfe78acbaa2d1ab620e2ca66dba7ec76d381594ac5fe96f9a21d568c611

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6+:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5z

Malware Config

Targets

    • Target

      06c73b612212a1f2e1f7bb3cec148820

    • Size

      512KB

    • MD5

      06c73b612212a1f2e1f7bb3cec148820

    • SHA1

      352b9262894d045be6f743a382905f566f9c0dfd

    • SHA256

      87a6780865f90a110b2e39fcda91d7cfa34e748b03a712d8170dd59a2194bedc

    • SHA512

      8ebf7d37a47e20dfec0397df7a5c5821cd53af182d31c5db24cf7cecb57ca647d7733bfe78acbaa2d1ab620e2ca66dba7ec76d381594ac5fe96f9a21d568c611

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6+:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5z

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks