General

  • Target

    103d374e82a0cfa2905a6d083086c8a9

  • Size

    512KB

  • Sample

    231224-y1sfjsaeg6

  • MD5

    103d374e82a0cfa2905a6d083086c8a9

  • SHA1

    db6176647905365900748760992a92cb3847a8a9

  • SHA256

    deb5829060f96aab1fa6bec11e69d07e0ae6fb99e21cc85c5b9e5b760c1796dd

  • SHA512

    1d96beb2499175199f9815f10e071f92f0a6f89fd77cf24110354d9df3ca102c03961cf4a41d9a8970c7e068bd0943d27f3a360dae733311c8cea08496c3535b

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6S:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5z

Malware Config

Targets

    • Target

      103d374e82a0cfa2905a6d083086c8a9

    • Size

      512KB

    • MD5

      103d374e82a0cfa2905a6d083086c8a9

    • SHA1

      db6176647905365900748760992a92cb3847a8a9

    • SHA256

      deb5829060f96aab1fa6bec11e69d07e0ae6fb99e21cc85c5b9e5b760c1796dd

    • SHA512

      1d96beb2499175199f9815f10e071f92f0a6f89fd77cf24110354d9df3ca102c03961cf4a41d9a8970c7e068bd0943d27f3a360dae733311c8cea08496c3535b

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6S:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5z

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks