General

  • Target

    02c81055545d2e262713b1e5d233c892db198943001ee869f46be1cd1e36abd7

  • Size

    74KB

  • Sample

    240421-bhk77aeh63

  • MD5

    4282fd4222138bfc7229a802d63d9146

  • SHA1

    cdebdf832907a16dba3cb85c1cd60e1db1d31535

  • SHA256

    02c81055545d2e262713b1e5d233c892db198943001ee869f46be1cd1e36abd7

  • SHA512

    f6a1748789def0598f7c27c74594c6144777c714c929acc4180aa5cde000e871b1a887702dc86b2b4ceed4086201b113c2d7c26dc372bb4c41ba34a1e69e81d7

  • SSDEEP

    768:fXqien69IBx4TOLRb56fh3NgBzIeOCP+MOFSIB/JPgi011UAbebp3EaPXHMV1jzB:/en69Wl1jX/YpgCqhj+Dib0k

Malware Config

Targets

    • Target

      02c81055545d2e262713b1e5d233c892db198943001ee869f46be1cd1e36abd7

    • Size

      74KB

    • MD5

      4282fd4222138bfc7229a802d63d9146

    • SHA1

      cdebdf832907a16dba3cb85c1cd60e1db1d31535

    • SHA256

      02c81055545d2e262713b1e5d233c892db198943001ee869f46be1cd1e36abd7

    • SHA512

      f6a1748789def0598f7c27c74594c6144777c714c929acc4180aa5cde000e871b1a887702dc86b2b4ceed4086201b113c2d7c26dc372bb4c41ba34a1e69e81d7

    • SSDEEP

      768:fXqien69IBx4TOLRb56fh3NgBzIeOCP+MOFSIB/JPgi011UAbebp3EaPXHMV1jzB:/en69Wl1jX/YpgCqhj+Dib0k

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks