General

  • Target

    be588089641da2218ce45a58ad22ba5b

  • Size

    302KB

  • Sample

    240310-maa8ssae7x

  • MD5

    be588089641da2218ce45a58ad22ba5b

  • SHA1

    1e7f5fde2620d2d03c641ff34613e2e4b1a309ce

  • SHA256

    52e668ee598cb3092c1b3961c1822fe6f9fad2509afbe4d1164d72b32e764f39

  • SHA512

    3fe3cfc17f3059793221641430114e6628545f28c6f83b2ee6f2b242e00a798899f74196e82d42eedf918f2bf336d44e27d3e52e73f1296fa6b00f7c04b2a21e

  • SSDEEP

    1536:bfYN9rNH+o0d3kV5zfmV994m6ZJ/Fp/KXsit8s1u6dBpUUNG8b:E5+o0d3oz6L563v3A8s1lvi

Malware Config

Targets

    • Target

      be588089641da2218ce45a58ad22ba5b

    • Size

      302KB

    • MD5

      be588089641da2218ce45a58ad22ba5b

    • SHA1

      1e7f5fde2620d2d03c641ff34613e2e4b1a309ce

    • SHA256

      52e668ee598cb3092c1b3961c1822fe6f9fad2509afbe4d1164d72b32e764f39

    • SHA512

      3fe3cfc17f3059793221641430114e6628545f28c6f83b2ee6f2b242e00a798899f74196e82d42eedf918f2bf336d44e27d3e52e73f1296fa6b00f7c04b2a21e

    • SSDEEP

      1536:bfYN9rNH+o0d3kV5zfmV994m6ZJ/Fp/KXsit8s1u6dBpUUNG8b:E5+o0d3oz6L563v3A8s1lvi

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks