General

  • Target

    0f6c9ce864ca5a40348b4c128d10c964

  • Size

    208KB

  • Sample

    231224-yrajdafahn

  • MD5

    0f6c9ce864ca5a40348b4c128d10c964

  • SHA1

    64758445ad7f8b28a8f04dbd38e11cb57be4de57

  • SHA256

    48cad7de3bb1247a5fafff1d3a206c3ec11c37b51b125176e4c8de92308a232c

  • SHA512

    e6d7eecee4304bd7df5d52347ee001e19298846ec0f3af2a6f394c77a5368791f087b2897d06aea99fec97461638de3183a47b6248e6e0ed9516ea8d3daf4ad2

  • SSDEEP

    3072:cOJopl0OAbGi6sW3hMKtiV8QwOKqTg63vkHnjwD:Cl0HNTeMVldrU63vEnU

Malware Config

Targets

    • Target

      0f6c9ce864ca5a40348b4c128d10c964

    • Size

      208KB

    • MD5

      0f6c9ce864ca5a40348b4c128d10c964

    • SHA1

      64758445ad7f8b28a8f04dbd38e11cb57be4de57

    • SHA256

      48cad7de3bb1247a5fafff1d3a206c3ec11c37b51b125176e4c8de92308a232c

    • SHA512

      e6d7eecee4304bd7df5d52347ee001e19298846ec0f3af2a6f394c77a5368791f087b2897d06aea99fec97461638de3183a47b6248e6e0ed9516ea8d3daf4ad2

    • SSDEEP

      3072:cOJopl0OAbGi6sW3hMKtiV8QwOKqTg63vkHnjwD:Cl0HNTeMVldrU63vEnU

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks