General

  • Target

    15ab0a725fb6a659909cc1faf2600910.exe

  • Size

    512KB

  • Sample

    240103-r2q6jsehej

  • MD5

    15ab0a725fb6a659909cc1faf2600910

  • SHA1

    c7522e69040c0780f297937cd7c70a91fa44fc3e

  • SHA256

    caf8e784f7a32ab970dc20feb31848377f4705fd4c093a96123fcdd948be8e4a

  • SHA512

    3adfc2caaa45030e8346c01e8b791f541fb4f663c82d7ea33d72dfa477f355cbc82fb9fa5bbbae857882668930a4615eba245ad2b34583d05cd4208815423412

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6W:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5r

Malware Config

Targets

    • Target

      15ab0a725fb6a659909cc1faf2600910.exe

    • Size

      512KB

    • MD5

      15ab0a725fb6a659909cc1faf2600910

    • SHA1

      c7522e69040c0780f297937cd7c70a91fa44fc3e

    • SHA256

      caf8e784f7a32ab970dc20feb31848377f4705fd4c093a96123fcdd948be8e4a

    • SHA512

      3adfc2caaa45030e8346c01e8b791f541fb4f663c82d7ea33d72dfa477f355cbc82fb9fa5bbbae857882668930a4615eba245ad2b34583d05cd4208815423412

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6W:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5r

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks