General

  • Target

    Winhost.zip

  • Size

    1.1MB

  • Sample

    240429-rp7b1acf87

  • MD5

    7c3fca72375268f0b9129801ca140161

  • SHA1

    2f51f3c96e9c94c849ae44816791bdff1d776c59

  • SHA256

    0ab4136e7ea5cb294c593da40b368d327d77fd0e232adc9deb39e7daf5ade01f

  • SHA512

    0dc256902bf28914e74b65059efea2427eb1a5e8c6c97a071c1b237d90586125ac6b732731c1b4e06c97b14a1322489ed7eb9d4fb4ccf7c1fd55db5855a8bf10

  • SSDEEP

    24576:I7Mhd0Wi7fch0To7G6jV3l4uXg5jhuTAyjO9fTs7W3plmOa:wXzKG6XRXgJhusyo7ZQ

Malware Config

Targets

    • Target

      Winhost.dll

    • Size

      1.0MB

    • MD5

      99aa5444189f72f8f88a5b509390ce3c

    • SHA1

      59653e399450e052686fe8746f021dcd15347a1a

    • SHA256

      351b3e313df58ea5cc98be58c6df859aea392f60e8001fee12ab517aefd8ff7a

    • SHA512

      d3899641a7f4271de9e56a013d05b71c2880b55bd3a6e43f6b0329f080530c698a065b4a6c3df9a2e3acebbeda4cf060066c7b519584868e717abbf42341861d

    • SSDEEP

      24576:r5A5tpOMihhYhs5Wjo6jVblMu5kFvhsTuQJwFrHyzu:rIWBnio63V5kNhsaQYL

    Score
    1/10
    • Target

      Winhost.exe

    • Size

      139KB

    • MD5

      b046a025e8e53fbd316629125c687c3d

    • SHA1

      5fc76dc221a4287b706ecc57834e7ed848d41a46

    • SHA256

      bc18713902edd2f64cae8d04bf37b8545a10c7882e3d3b1fb6f26a677f27434c

    • SHA512

      be05f7f721d11733172f91d9aad622a86917ccac0e28817ab54d28d13510654755f40a986300d3b823d91fa041ee806823704e3537b2e31dd9de144ac25f7895

    • SSDEEP

      3072:uiS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJA8ltE:uiS4ompB9S3BZi0a1G78IVhcSct

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables cmd.exe use via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks