General

  • Target

    ccb0a2417311ee020462fb12ea0997c8

  • Size

    3.8MB

  • Sample

    240316-a81vwsfg81

  • MD5

    ccb0a2417311ee020462fb12ea0997c8

  • SHA1

    3e353cc170d074b39969c5b072a683816fbe90e5

  • SHA256

    7f22ddaed36bd116459789fee0315812dcc68c99bcd908d54ddaa2f0e6df47b2

  • SHA512

    298dc356cbfae40cb6d554b9d059dd02fd16d971aac28f84f34c75466070de106d2032e47cbc8ebbf37c3ceb73267fd6b4ebfc757121409763ab9fc74f645abe

  • SSDEEP

    98304:hhfMbhvRDp0/EbYb1Ts7AEA6Ri5np/FOCM3YhHT2JQ3gYU:hhAhlu/EbylsMV6M/NPMIhz+B

Malware Config

Targets

    • Target

      ccb0a2417311ee020462fb12ea0997c8

    • Size

      3.8MB

    • MD5

      ccb0a2417311ee020462fb12ea0997c8

    • SHA1

      3e353cc170d074b39969c5b072a683816fbe90e5

    • SHA256

      7f22ddaed36bd116459789fee0315812dcc68c99bcd908d54ddaa2f0e6df47b2

    • SHA512

      298dc356cbfae40cb6d554b9d059dd02fd16d971aac28f84f34c75466070de106d2032e47cbc8ebbf37c3ceb73267fd6b4ebfc757121409763ab9fc74f645abe

    • SSDEEP

      98304:hhfMbhvRDp0/EbYb1Ts7AEA6Ri5np/FOCM3YhHT2JQ3gYU:hhAhlu/EbylsMV6M/NPMIhz+B

    • Modifies Windows Defender notification settings

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Disables Task Manager via registry modification

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks