General

  • Target

    f72646a0d143568fe3f7fc93fa10c033

  • Size

    512KB

  • Sample

    231228-zlr2xageh5

  • MD5

    f72646a0d143568fe3f7fc93fa10c033

  • SHA1

    0fed8b5ca4de18e9c06e4c5a629649ce554e86f2

  • SHA256

    ce0aa8eeaa32fd6faf6655eaa865f35c47a8450cd90dabfe551c198fb630f66b

  • SHA512

    fed2d7b49e1d084c8ae31bc0082ed631a0233f2d56db9dd46d023180244df499dc0eb8c23ddf5a4c98e43f0542e369fff06ae67e622d78d67dfe02dde0a1633e

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj61:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5+

Malware Config

Targets

    • Target

      f72646a0d143568fe3f7fc93fa10c033

    • Size

      512KB

    • MD5

      f72646a0d143568fe3f7fc93fa10c033

    • SHA1

      0fed8b5ca4de18e9c06e4c5a629649ce554e86f2

    • SHA256

      ce0aa8eeaa32fd6faf6655eaa865f35c47a8450cd90dabfe551c198fb630f66b

    • SHA512

      fed2d7b49e1d084c8ae31bc0082ed631a0233f2d56db9dd46d023180244df499dc0eb8c23ddf5a4c98e43f0542e369fff06ae67e622d78d67dfe02dde0a1633e

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj61:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5+

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks