General

  • Target

    49513d0e6c1b9da4c43bd82d0a88f4fc

  • Size

    512KB

  • Sample

    231226-bvr69sback

  • MD5

    49513d0e6c1b9da4c43bd82d0a88f4fc

  • SHA1

    ccbeea366ee8b373093bfc76dad79e26e2e4cd36

  • SHA256

    ea2eb01280887f557507e1980963cc3d5dd8f35a5296b432f7a8ec5da88aa5b1

  • SHA512

    ac2d587b66aec38995176e5ea650dc8ac30a98221a3fa7b9b937bb0d6088c17974ba1e8f55f0b21b62582cf2ea35af8c6688977c06d935d186d424541a1ab71a

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6g:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm53

Malware Config

Targets

    • Target

      49513d0e6c1b9da4c43bd82d0a88f4fc

    • Size

      512KB

    • MD5

      49513d0e6c1b9da4c43bd82d0a88f4fc

    • SHA1

      ccbeea366ee8b373093bfc76dad79e26e2e4cd36

    • SHA256

      ea2eb01280887f557507e1980963cc3d5dd8f35a5296b432f7a8ec5da88aa5b1

    • SHA512

      ac2d587b66aec38995176e5ea650dc8ac30a98221a3fa7b9b937bb0d6088c17974ba1e8f55f0b21b62582cf2ea35af8c6688977c06d935d186d424541a1ab71a

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6g:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm53

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks