General

  • Target

    Eleven.exe

  • Size

    247KB

  • Sample

    240514-2v13aada98

  • MD5

    8f60050dd31867362c6c1b68f30b84b4

  • SHA1

    d4a286678379d59fe42f0904f3b190f433c1832c

  • SHA256

    b2a8de6f241ec690374440a200d6b3977267927afc05e16581b2adcaafa9fa66

  • SHA512

    5acbdcec6c45dd5a529630d4f20ec4064faf955ddd607dc86a58e62752f927eca1a7ccbedb2f9409220cd1c28a78d272df503f4410dd2889f91f9ea9c6f9e3c8

  • SSDEEP

    6144:UkQmx/LcTEyF1dH3VOVw44UOisbaxHUsAxyOzk9jAoVUAb:UkuBREcUkHxy8yAoV

Malware Config

Targets

    • Target

      Eleven.exe

    • Size

      247KB

    • MD5

      8f60050dd31867362c6c1b68f30b84b4

    • SHA1

      d4a286678379d59fe42f0904f3b190f433c1832c

    • SHA256

      b2a8de6f241ec690374440a200d6b3977267927afc05e16581b2adcaafa9fa66

    • SHA512

      5acbdcec6c45dd5a529630d4f20ec4064faf955ddd607dc86a58e62752f927eca1a7ccbedb2f9409220cd1c28a78d272df503f4410dd2889f91f9ea9c6f9e3c8

    • SSDEEP

      6144:UkQmx/LcTEyF1dH3VOVw44UOisbaxHUsAxyOzk9jAoVUAb:UkuBREcUkHxy8yAoV

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks