General

  • Target

    0d7fce70aca9ba6de2e300b04fbb598a

  • Size

    512KB

  • Sample

    231224-x6t1wsdce8

  • MD5

    0d7fce70aca9ba6de2e300b04fbb598a

  • SHA1

    cb111d8408be1350abc3351897ac7d6a80cd443d

  • SHA256

    258aaf878f86e50ef7871a91fddc9a8ac18a45a9b562c056c072732ccac592be

  • SHA512

    a67dda0f07bcc17c5d86ae5c513a19daaacdb97a58d551b5656811933bd3c0f53d0e8cea1c3697c007b8172976be67b7ad6be341d3208faaafc34aed2a83f07e

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6B:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm58

Malware Config

Targets

    • Target

      0d7fce70aca9ba6de2e300b04fbb598a

    • Size

      512KB

    • MD5

      0d7fce70aca9ba6de2e300b04fbb598a

    • SHA1

      cb111d8408be1350abc3351897ac7d6a80cd443d

    • SHA256

      258aaf878f86e50ef7871a91fddc9a8ac18a45a9b562c056c072732ccac592be

    • SHA512

      a67dda0f07bcc17c5d86ae5c513a19daaacdb97a58d551b5656811933bd3c0f53d0e8cea1c3697c007b8172976be67b7ad6be341d3208faaafc34aed2a83f07e

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6B:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm58

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks