General

  • Target

    93d67529cf14412f253e3ffc005e235733a4fea83e999f77fac31a0f581a867c

  • Size

    1.1MB

  • Sample

    240404-21zreadf42

  • MD5

    29d044809809aabd82305ce04ac88736

  • SHA1

    683b89f68681730e2828be556d5c687cc1a4a2bf

  • SHA256

    93d67529cf14412f253e3ffc005e235733a4fea83e999f77fac31a0f581a867c

  • SHA512

    a7517d7e12962ee42ff42fb941bc6756238cb9f157e8f14958563fc43f9929db8b3a76fd944d7136e21b5bc85178c76b2ba0e412ceb828a74e5b5e78b735c286

  • SSDEEP

    12288:Lkt3OB1IWL78Z8L7JQQRfOBkkt3OB9JQQRnOBHIWL7JQQRZOBrOB1IWL7JQQRZOV:4eB1BRWBZeBbROBHDRABqB1DRAB19

Malware Config

Targets

    • Target

      93d67529cf14412f253e3ffc005e235733a4fea83e999f77fac31a0f581a867c

    • Size

      1.1MB

    • MD5

      29d044809809aabd82305ce04ac88736

    • SHA1

      683b89f68681730e2828be556d5c687cc1a4a2bf

    • SHA256

      93d67529cf14412f253e3ffc005e235733a4fea83e999f77fac31a0f581a867c

    • SHA512

      a7517d7e12962ee42ff42fb941bc6756238cb9f157e8f14958563fc43f9929db8b3a76fd944d7136e21b5bc85178c76b2ba0e412ceb828a74e5b5e78b735c286

    • SSDEEP

      12288:Lkt3OB1IWL78Z8L7JQQRfOBkkt3OB9JQQRnOBHIWL7JQQRZOBrOB1IWL7JQQRZOV:4eB1BRWBZeBbROBHDRABqB1DRAB19

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UPX dump on OEP (original entry point)

    • Disables RegEdit via registry modification

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks