General

  • Target

    8bb81c4429af6264d0b66a08f390a9e1

  • Size

    255KB

  • Sample

    240203-h1stbabgf3

  • MD5

    8bb81c4429af6264d0b66a08f390a9e1

  • SHA1

    ad37f4486bb34aea07696f8d4a768d013f0cb327

  • SHA256

    5d93fbdf61ec1b60b3b3ac8e2420a5b197f888e54e5a6aaaa048e62cefdb24bf

  • SHA512

    57d1a45fbb2307f7f212fa6a4fdcaf79dd7ba4d046cb78d295b40009901c233031ad338b9d65320a6cbc738fc9c85a88c752f8f2b7a6d4155ac21c0fda31e709

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJV:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIG

Malware Config

Targets

    • Target

      8bb81c4429af6264d0b66a08f390a9e1

    • Size

      255KB

    • MD5

      8bb81c4429af6264d0b66a08f390a9e1

    • SHA1

      ad37f4486bb34aea07696f8d4a768d013f0cb327

    • SHA256

      5d93fbdf61ec1b60b3b3ac8e2420a5b197f888e54e5a6aaaa048e62cefdb24bf

    • SHA512

      57d1a45fbb2307f7f212fa6a4fdcaf79dd7ba4d046cb78d295b40009901c233031ad338b9d65320a6cbc738fc9c85a88c752f8f2b7a6d4155ac21c0fda31e709

    • SSDEEP

      3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJV:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIG

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks