General

  • Target

    52e78e101a47d6085301c75037e86e97

  • Size

    512KB

  • Sample

    240111-h9mcwscdg9

  • MD5

    52e78e101a47d6085301c75037e86e97

  • SHA1

    b295a4a2c6b85a2723df7b86e0d56bb57227ad65

  • SHA256

    1a3be8fd63c83795f1307fe15a19d1e97e82e58b2c98a87ef6a3394a19f91aba

  • SHA512

    56d10d77bf5b5cb04f51502ca7003695117e56fbede58838018c5aa95b655a55bb877ed8c5fc558b6603f3a6a001e794942fc6be9ebd42396c4f88412fece91c

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj67:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5I

Malware Config

Targets

    • Target

      52e78e101a47d6085301c75037e86e97

    • Size

      512KB

    • MD5

      52e78e101a47d6085301c75037e86e97

    • SHA1

      b295a4a2c6b85a2723df7b86e0d56bb57227ad65

    • SHA256

      1a3be8fd63c83795f1307fe15a19d1e97e82e58b2c98a87ef6a3394a19f91aba

    • SHA512

      56d10d77bf5b5cb04f51502ca7003695117e56fbede58838018c5aa95b655a55bb877ed8c5fc558b6603f3a6a001e794942fc6be9ebd42396c4f88412fece91c

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj67:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5I

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks