General

  • Target

    0fd0fff8835c67f627c0e0e3b2a55f12

  • Size

    262KB

  • Sample

    231230-fza6rsfbc2

  • MD5

    0fd0fff8835c67f627c0e0e3b2a55f12

  • SHA1

    db6a26f67ef5278980c4f5452f79de5d7c0f62fc

  • SHA256

    e8ef7886c7c5ad1b6023e420e50707795386f44320d644712183d286e55e38d2

  • SHA512

    7fa0bd92579036a1b18dc6c32d3f192d4caf2b10ef8b182fc513e6b7c23c9d5d70643259102468a4136e2da59b9bb540aa503e1d05c205043e0edb1f33c50b7f

  • SSDEEP

    3072:BDrF9h20NUmzQze45ggO8/tmiG+lDe7eWQbFo90mcrWt7HrOgwcoutZ:B19RNUmzQzjgH8/tmiGqcoS

Malware Config

Targets

    • Target

      0fd0fff8835c67f627c0e0e3b2a55f12

    • Size

      262KB

    • MD5

      0fd0fff8835c67f627c0e0e3b2a55f12

    • SHA1

      db6a26f67ef5278980c4f5452f79de5d7c0f62fc

    • SHA256

      e8ef7886c7c5ad1b6023e420e50707795386f44320d644712183d286e55e38d2

    • SHA512

      7fa0bd92579036a1b18dc6c32d3f192d4caf2b10ef8b182fc513e6b7c23c9d5d70643259102468a4136e2da59b9bb540aa503e1d05c205043e0edb1f33c50b7f

    • SSDEEP

      3072:BDrF9h20NUmzQze45ggO8/tmiG+lDe7eWQbFo90mcrWt7HrOgwcoutZ:B19RNUmzQzjgH8/tmiGqcoS

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks