General

  • Target

    e625bf19f9b7e382052a84ebb8259a373022ff33c6b2b1814ae37371f41dbc71

  • Size

    757KB

  • Sample

    240418-eaay2aaa73

  • MD5

    12f886fb5118426b6b1ce9d96fc6163c

  • SHA1

    918eedee0f4c5404c50b75e981ec1a9bbf81dad6

  • SHA256

    e625bf19f9b7e382052a84ebb8259a373022ff33c6b2b1814ae37371f41dbc71

  • SHA512

    ef03918779cceb034f62b0bc6213e26c28cb971ec023f6af88bfdbef01508911e679f0f82934679c98ed88f4203a604fa6c9a3923f7cea3f50c849750a3b6cb0

  • SSDEEP

    12288:Ukt3OB1IWL78L7JQQRfOBkkt3OB1IWL7JQQRnOBHIWL7JQQR4:JeB1URWBZeB1DROBHDR4

Malware Config

Targets

    • Target

      e625bf19f9b7e382052a84ebb8259a373022ff33c6b2b1814ae37371f41dbc71

    • Size

      757KB

    • MD5

      12f886fb5118426b6b1ce9d96fc6163c

    • SHA1

      918eedee0f4c5404c50b75e981ec1a9bbf81dad6

    • SHA256

      e625bf19f9b7e382052a84ebb8259a373022ff33c6b2b1814ae37371f41dbc71

    • SHA512

      ef03918779cceb034f62b0bc6213e26c28cb971ec023f6af88bfdbef01508911e679f0f82934679c98ed88f4203a604fa6c9a3923f7cea3f50c849750a3b6cb0

    • SSDEEP

      12288:Ukt3OB1IWL78L7JQQRfOBkkt3OB1IWL7JQQRnOBHIWL7JQQR4:JeB1URWBZeB1DROBHDR4

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UPX dump on OEP (original entry point)

    • Disables RegEdit via registry modification

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks