General

  • Target

    Seven.zip

  • Size

    1.4MB

  • Sample

    240430-bglgkafg33

  • MD5

    bdf74348cb0d18ad1eb6c15bdb6a6340

  • SHA1

    10659b2352dc66c85d86475a74d2a663ec3b50a4

  • SHA256

    46b11a3a4566f2500ef0c18da7896aa3ed55c7fa189a867f7b0ba7f2558f8e93

  • SHA512

    9674060b25bb2055a1d31a4eeeb934ea782ad768012afaa8d9b1ef423b8b3c8672176e9530bcb90fc90136004d07a862d9f53f068639675782b30598ab4ab030

  • SSDEEP

    24576:V9SRIGmHUqjBDlMoHW1W8x0LhUJFvke9gvddVUXYUcsLTklYU9qoZyiFTvMGWDrA:V9SRGHUqfpHW1WtUN9glYLTkuU9qoZ/n

Malware Config

Targets

    • Target

      Seven.dll

    • Size

      1.3MB

    • MD5

      e3efaf5cbea6c37a31c25f83754b90dd

    • SHA1

      ee2a8a59f4b81470ed61bd5721fd6452b29b3a85

    • SHA256

      97bba47d5f89e3231e13066894c0b91e335be042b2ceb7047298dcec556ef81d

    • SHA512

      f1faf5329d1d7c9499c49d4fdc3bb83a854d2eec791a3f3e3a70a74c3031aed665b1ce63707e3a56ac7cdd77ad54679c9f2edd4c646dd7f0e50f7ec94ec63e93

    • SSDEEP

      24576:wih2imlCqjV/l4uHc1WEL0LFqXF36GFMvTTVuJ66ggh3yjYUUyqcdygtTzoqWZb:wihqlCq7RHc1WdqRFMbQh3y0Ubqcdv8q

    Score
    1/10
    • Target

      Seven.exe

    • Size

      139KB

    • MD5

      350273e0d2e8a9ba5e37b791016112a0

    • SHA1

      5bfb616dd46f67d1dcbbff55ca5917ffc1ec8b71

    • SHA256

      27297bf8139bea755e9297e7e1489d827d1ee09a8e1d94a3ef96a2edb2de61ba

    • SHA512

      b1e768524b4e840bd5f4163205122dd1725583245d8bfd5cbd89eb21a5fb9d33aff1b7b0ca42132b7dae469e025068ae663b3b02ad59927a558dc340141ec91b

    • SSDEEP

      3072:miS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJd8ltw:miS4ompB9S3BZi0a1G78IVhcTct

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables cmd.exe use via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks