General

  • Target

    20240106b920bbb7246337069ab2710414a6f6d7lock.exe

  • Size

    256KB

  • Sample

    240107-x3erssdcc7

  • MD5

    b920bbb7246337069ab2710414a6f6d7

  • SHA1

    42efa702ed854055daf7e0eebf0b581474e5ab15

  • SHA256

    662b3372540e486334dc3395a5abbb35a1499295dc238d25828c4664145ff110

  • SHA512

    c6ef64c4992dfc16be87844da9d241508ef2be886d1754c294805753382f32d1ded0b3cfc1469e8cb2eb04874d354994d3ee105df95f8a9a7613a4ebd8562d88

  • SSDEEP

    6144:DCIo56VkA5n9VPvKNem3QYhYkOf/UWgqd:DCIac5n3nY9yD/bDd

Malware Config

Targets

    • Target

      20240106b920bbb7246337069ab2710414a6f6d7lock.exe

    • Size

      256KB

    • MD5

      b920bbb7246337069ab2710414a6f6d7

    • SHA1

      42efa702ed854055daf7e0eebf0b581474e5ab15

    • SHA256

      662b3372540e486334dc3395a5abbb35a1499295dc238d25828c4664145ff110

    • SHA512

      c6ef64c4992dfc16be87844da9d241508ef2be886d1754c294805753382f32d1ded0b3cfc1469e8cb2eb04874d354994d3ee105df95f8a9a7613a4ebd8562d88

    • SSDEEP

      6144:DCIo56VkA5n9VPvKNem3QYhYkOf/UWgqd:DCIac5n3nY9yD/bDd

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks