General

  • Target

    65e295f0a2fdb80b2a4bb583a02ff9e4

  • Size

    8.9MB

  • Sample

    240118-yjkpdaghc4

  • MD5

    65e295f0a2fdb80b2a4bb583a02ff9e4

  • SHA1

    3dc730e319062265a772028119a9e243327ffa91

  • SHA256

    c267ee0935b296edec39401158fa932ae56166ead926a7af477915fae4428952

  • SHA512

    9f9e6bda7a33a9c72cc8f3ad51b4d4a56d217de445bb13c56b983862990138a67f9ff5426fec0e2f563e716807891e4f2edf1652a16a710f3f972efef15b668d

  • SSDEEP

    196608:b2hRG0S9yR0zxkqYZ6iG+mwZwoZhJ0E2SQ6DTkr:r9Sc+mOwox0wQ6Xkr

Malware Config

Targets

    • Target

      65e295f0a2fdb80b2a4bb583a02ff9e4

    • Size

      8.9MB

    • MD5

      65e295f0a2fdb80b2a4bb583a02ff9e4

    • SHA1

      3dc730e319062265a772028119a9e243327ffa91

    • SHA256

      c267ee0935b296edec39401158fa932ae56166ead926a7af477915fae4428952

    • SHA512

      9f9e6bda7a33a9c72cc8f3ad51b4d4a56d217de445bb13c56b983862990138a67f9ff5426fec0e2f563e716807891e4f2edf1652a16a710f3f972efef15b668d

    • SSDEEP

      196608:b2hRG0S9yR0zxkqYZ6iG+mwZwoZhJ0E2SQ6DTkr:r9Sc+mOwox0wQ6Xkr

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks