General

  • Target

    3d93d3286dc09f2b25682cc346d01189

  • Size

    512KB

  • Sample

    231225-1de8tafda2

  • MD5

    3d93d3286dc09f2b25682cc346d01189

  • SHA1

    1df0f828c1be290b2024f9ecb6dd3a1f50504dad

  • SHA256

    e423e3de4edc5a8d68f49dbe54df44a7c32d255ebdc23b775f9225b31e2ba93a

  • SHA512

    782edac286467c6b62012d35258e3041d11b40bb44c0eec0cef0813449275259416635aa75b573eca96d9696d434e7e03869b786d19df2acc614f174e14be008

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6/:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5U

Malware Config

Targets

    • Target

      3d93d3286dc09f2b25682cc346d01189

    • Size

      512KB

    • MD5

      3d93d3286dc09f2b25682cc346d01189

    • SHA1

      1df0f828c1be290b2024f9ecb6dd3a1f50504dad

    • SHA256

      e423e3de4edc5a8d68f49dbe54df44a7c32d255ebdc23b775f9225b31e2ba93a

    • SHA512

      782edac286467c6b62012d35258e3041d11b40bb44c0eec0cef0813449275259416635aa75b573eca96d9696d434e7e03869b786d19df2acc614f174e14be008

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6/:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5U

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Modifies Installed Components in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks