General

  • Target

    7d24010eb08730dd1a7e40b79381cdc3

  • Size

    512KB

  • Sample

    231226-t3z6ysdde5

  • MD5

    7d24010eb08730dd1a7e40b79381cdc3

  • SHA1

    aa922253d15e2d5f4b9d559f715b60fcbdbc1475

  • SHA256

    947f41a40d502d6f57b09bcf00e90d80cbfa8a996dd8891aecdedb507652f690

  • SHA512

    f676b1201bbcc1c0165f5020e69ef5c8f71a77f0ed62b6862439afdf28ad511820899f7ecb2057c4c12ff1c893c91702a0ba5278bb76320bc3ec5b5d612b6e53

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6E:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5t

Malware Config

Targets

    • Target

      7d24010eb08730dd1a7e40b79381cdc3

    • Size

      512KB

    • MD5

      7d24010eb08730dd1a7e40b79381cdc3

    • SHA1

      aa922253d15e2d5f4b9d559f715b60fcbdbc1475

    • SHA256

      947f41a40d502d6f57b09bcf00e90d80cbfa8a996dd8891aecdedb507652f690

    • SHA512

      f676b1201bbcc1c0165f5020e69ef5c8f71a77f0ed62b6862439afdf28ad511820899f7ecb2057c4c12ff1c893c91702a0ba5278bb76320bc3ec5b5d612b6e53

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6E:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5t

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks