General

  • Target

    cea32f770e1620de29e73acbc718a38e.bin

  • Size

    1.9MB

  • Sample

    240104-cbg3maegcl

  • MD5

    c379a2e56437662163d932969ddfeba9

  • SHA1

    65f266a4275df96fa8771fd766dca89af158d125

  • SHA256

    8a5593e547d72112c26db5af41848ed3944132d0a36b7d658b6b2a5f3f76b0ef

  • SHA512

    c1657a99dda454443e0a824fb82f308b471389b060e0ad7ab773160f2f295804c90556a8e8aeadc3896cde370b771f9c0080fe15f61ffcd7f8b8e9543afad473

  • SSDEEP

    49152:hxlfhlG4uo491WMZFx3FC/wH68uKcMyXc9an8aB7ajnq8pP9vkNL:blJlJuzjVNVH7czXc9M82avV9MNL

Malware Config

Targets

    • Target

      46a740caf7240211b8c2eb2ea95f5a8742a6d9002af7053100f62720aa7e5cbb.exe

    • Size

      1.9MB

    • MD5

      cea32f770e1620de29e73acbc718a38e

    • SHA1

      32a7f2f7a42a28ea751fc1decc2c67e717295e5b

    • SHA256

      46a740caf7240211b8c2eb2ea95f5a8742a6d9002af7053100f62720aa7e5cbb

    • SHA512

      8962db358426a7e2758d759e95232b7f23c16b84f7f93c573a7eaa9135bb5aaa3dc9ba1f4e0547b9ca67a54d9e097415197bd5de2efdce63415a791ddea1bd03

    • SSDEEP

      49152:JW5z1o02R2cFNGLoygKtsbEMZV1rvX50VeV4mhQ:gE03yNFRbEMR5cea

    • Detected google phishing page

    • Modifies Windows Defender Real-time Protection settings

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks