General

  • Target

    4adc0179ba4ac9bfb5d708084fe877df

  • Size

    488KB

  • Sample

    240108-jpz9paefg9

  • MD5

    4adc0179ba4ac9bfb5d708084fe877df

  • SHA1

    ee7243698df5b8f8fa973ad3c3e3b777474257ba

  • SHA256

    7e4a2e3849766818f817ed23fce3d1f8d276835743d56ee32dfb943060251f21

  • SHA512

    4118009526a5a8d757977b1775c07de17b12f249e662bfafa7b41ae9f9dbdc2b9004bbd8f2151a47c9525bce0ee4d3451b9bc73cc7a253642fe6c7a41551f87b

  • SSDEEP

    12288:Bp2W3NYU93gN1MDOnhsprGrYkwDcCHjDyp0BtILGBX1lWi+bIq:B33Nj93gv7erGrYVdDDdT+bI

Malware Config

Targets

    • Target

      4adc0179ba4ac9bfb5d708084fe877df

    • Size

      488KB

    • MD5

      4adc0179ba4ac9bfb5d708084fe877df

    • SHA1

      ee7243698df5b8f8fa973ad3c3e3b777474257ba

    • SHA256

      7e4a2e3849766818f817ed23fce3d1f8d276835743d56ee32dfb943060251f21

    • SHA512

      4118009526a5a8d757977b1775c07de17b12f249e662bfafa7b41ae9f9dbdc2b9004bbd8f2151a47c9525bce0ee4d3451b9bc73cc7a253642fe6c7a41551f87b

    • SSDEEP

      12288:Bp2W3NYU93gN1MDOnhsprGrYkwDcCHjDyp0BtILGBX1lWi+bIq:B33Nj93gv7erGrYVdDDdT+bI

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks