General

  • Target

    167f43c8f6106c01d7982c4385dbc03b

  • Size

    512KB

  • Sample

    231225-mam8csebe9

  • MD5

    167f43c8f6106c01d7982c4385dbc03b

  • SHA1

    a45f0b6b5c6309330da2bd88c287220058216cbd

  • SHA256

    fc42341043cd5da724203ecd147b04ccb2752447ecb43edf9e4222b61b6b4dee

  • SHA512

    b858e0d05040aa925acae142225a0faad780d8c9fcd7dbee07f5f98f06d12c318c5cae254fd24b0589c33308058ac6f28e3fcfa3d533784ff5333da98cc18b3e

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6s:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5R

Malware Config

Targets

    • Target

      167f43c8f6106c01d7982c4385dbc03b

    • Size

      512KB

    • MD5

      167f43c8f6106c01d7982c4385dbc03b

    • SHA1

      a45f0b6b5c6309330da2bd88c287220058216cbd

    • SHA256

      fc42341043cd5da724203ecd147b04ccb2752447ecb43edf9e4222b61b6b4dee

    • SHA512

      b858e0d05040aa925acae142225a0faad780d8c9fcd7dbee07f5f98f06d12c318c5cae254fd24b0589c33308058ac6f28e3fcfa3d533784ff5333da98cc18b3e

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6s:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5R

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks