General

  • Target

    d6c02228b951c4943cea2c6913e9c2dc

  • Size

    512KB

  • Sample

    240319-wfqp4sac34

  • MD5

    d6c02228b951c4943cea2c6913e9c2dc

  • SHA1

    6916ad5a0b3de36dfd8b777d35c8e80d529015bb

  • SHA256

    6c04097e57fcba5839e72a758d65ec8aa8c02ff611a792fb9760398e3d30da90

  • SHA512

    ee7a82c19dbd0836e23f6555fce04ae8d29d94d5df5c61186451502aa9a33d36ba11f1a1a20c3c126f8324c7dd191a6089269c8d26da272f4a63249fcc66c8ed

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5F

Malware Config

Targets

    • Target

      d6c02228b951c4943cea2c6913e9c2dc

    • Size

      512KB

    • MD5

      d6c02228b951c4943cea2c6913e9c2dc

    • SHA1

      6916ad5a0b3de36dfd8b777d35c8e80d529015bb

    • SHA256

      6c04097e57fcba5839e72a758d65ec8aa8c02ff611a792fb9760398e3d30da90

    • SHA512

      ee7a82c19dbd0836e23f6555fce04ae8d29d94d5df5c61186451502aa9a33d36ba11f1a1a20c3c126f8324c7dd191a6089269c8d26da272f4a63249fcc66c8ed

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5F

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks