General

  • Target

    fbfdbbc62b35284e7d5b75c32b7cda10

  • Size

    1.5MB

  • Sample

    231228-15kydadcgk

  • MD5

    fbfdbbc62b35284e7d5b75c32b7cda10

  • SHA1

    a6ba33b2c0ebc9d3618398b99b123c0a7310914b

  • SHA256

    19c449ff446bfa5dbd227232b4a778bad834cb39ca5e4522ccdcedf3303b3b1d

  • SHA512

    39204ff523aac565492c0ab9cf6ec5c77132f031cf6b5f75707cd3c36f52eae89d68e62c0aad2dc90c6d5aac6ea7d425da7763d22af666ecce910141e2ea0384

  • SSDEEP

    3072:0Dy+IvWylpIB7lxjn7wq6xwL0outeL5ctut/UX7xEgrD1asomkXokpAo9Pnx0UPD:AevdI3x8q6KL0oSeL5tt/wdaN7Co70

Malware Config

Targets

    • Target

      fbfdbbc62b35284e7d5b75c32b7cda10

    • Size

      1.5MB

    • MD5

      fbfdbbc62b35284e7d5b75c32b7cda10

    • SHA1

      a6ba33b2c0ebc9d3618398b99b123c0a7310914b

    • SHA256

      19c449ff446bfa5dbd227232b4a778bad834cb39ca5e4522ccdcedf3303b3b1d

    • SHA512

      39204ff523aac565492c0ab9cf6ec5c77132f031cf6b5f75707cd3c36f52eae89d68e62c0aad2dc90c6d5aac6ea7d425da7763d22af666ecce910141e2ea0384

    • SSDEEP

      3072:0Dy+IvWylpIB7lxjn7wq6xwL0outeL5ctut/UX7xEgrD1asomkXokpAo9Pnx0UPD:AevdI3x8q6KL0oSeL5tt/wdaN7Co70

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks