General

  • Target

    0f4ea1240a35596fa75f806961dc8ea7

  • Size

    1.1MB

  • Sample

    231225-jfss9adcar

  • MD5

    0f4ea1240a35596fa75f806961dc8ea7

  • SHA1

    0a765b1423e463a74a7f4dd94766c8f1718377ec

  • SHA256

    bca1b020a0979a241848066acf7eaf41b45254b789b9ecec17fde828ef58e430

  • SHA512

    a4f4d258d21c746d0aaf4db20cc99579dd233d2f84b7547a524e6c1d39a425b08f59ed4cbbd4c821734c69f3f043376c23fc11363a645ca3531bd0d7d4af4e9b

  • SSDEEP

    3072:vigQJYHrQbQ+cVEwTMZpgITj+uAdS58U:vigQ

Malware Config

Targets

    • Target

      0f4ea1240a35596fa75f806961dc8ea7

    • Size

      1.1MB

    • MD5

      0f4ea1240a35596fa75f806961dc8ea7

    • SHA1

      0a765b1423e463a74a7f4dd94766c8f1718377ec

    • SHA256

      bca1b020a0979a241848066acf7eaf41b45254b789b9ecec17fde828ef58e430

    • SHA512

      a4f4d258d21c746d0aaf4db20cc99579dd233d2f84b7547a524e6c1d39a425b08f59ed4cbbd4c821734c69f3f043376c23fc11363a645ca3531bd0d7d4af4e9b

    • SSDEEP

      3072:vigQJYHrQbQ+cVEwTMZpgITj+uAdS58U:vigQ

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Sets file execution options in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks