General

  • Target

    0d9f474df29eb4ffb4d1f4e635f7ed11

  • Size

    512KB

  • Sample

    231225-hxcb6abbf2

  • MD5

    0d9f474df29eb4ffb4d1f4e635f7ed11

  • SHA1

    05b21dab3d0b96599f0684167f28357701321dea

  • SHA256

    e15b5ac6472da325f757191e30b68456b0aaafde1c934a8614da7dac63f35a05

  • SHA512

    da0b35ec2141aa9827edb3c350b62b0e3db10524752b68d9831d334d173965d93ec7516e2c3d4814c365e797f86f613bf4e481fcc49225802e41bcc3a6462ce2

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6D:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5k

Malware Config

Targets

    • Target

      0d9f474df29eb4ffb4d1f4e635f7ed11

    • Size

      512KB

    • MD5

      0d9f474df29eb4ffb4d1f4e635f7ed11

    • SHA1

      05b21dab3d0b96599f0684167f28357701321dea

    • SHA256

      e15b5ac6472da325f757191e30b68456b0aaafde1c934a8614da7dac63f35a05

    • SHA512

      da0b35ec2141aa9827edb3c350b62b0e3db10524752b68d9831d334d173965d93ec7516e2c3d4814c365e797f86f613bf4e481fcc49225802e41bcc3a6462ce2

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6D:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5k

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks