General

  • Target

    8647351f3a2882d4d6c37d3d41e4c42b1bdc80d61f9f7572e262f7e7381b9144.exe

  • Size

    2.5MB

  • Sample

    240103-sykp2aaca9

  • MD5

    1a24421bed22f901ccd66d66cba8250c

  • SHA1

    560a9710a44769dd83ef01a43929808bae2fa6a9

  • SHA256

    8647351f3a2882d4d6c37d3d41e4c42b1bdc80d61f9f7572e262f7e7381b9144

  • SHA512

    6ca06dbdbb85dffafc56aa1883a6536d4a585c7eb62a8b7d3a3355b6e3bbaa40df01c6c444905c87558734374345acb8e1ad8f2a9e4f6716c204fda92f3cf778

  • SSDEEP

    49152:AsBZfN9yei2T2EtHagHclR8RnS6b1c4H7k8/CWf9PmFnMFrvGf:vZ1ZixsHagHcr87+fsJ1sMFrvK

Malware Config

Targets

    • Target

      8647351f3a2882d4d6c37d3d41e4c42b1bdc80d61f9f7572e262f7e7381b9144.exe

    • Size

      2.5MB

    • MD5

      1a24421bed22f901ccd66d66cba8250c

    • SHA1

      560a9710a44769dd83ef01a43929808bae2fa6a9

    • SHA256

      8647351f3a2882d4d6c37d3d41e4c42b1bdc80d61f9f7572e262f7e7381b9144

    • SHA512

      6ca06dbdbb85dffafc56aa1883a6536d4a585c7eb62a8b7d3a3355b6e3bbaa40df01c6c444905c87558734374345acb8e1ad8f2a9e4f6716c204fda92f3cf778

    • SSDEEP

      49152:AsBZfN9yei2T2EtHagHclR8RnS6b1c4H7k8/CWf9PmFnMFrvGf:vZ1ZixsHagHcr87+fsJ1sMFrvK

    • Modifies Windows Defender Real-time Protection settings

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks