General

  • Target

    d55d3cb460beee2ae3c0db2a748891974e76c731f506b55a15abf30b1009ce7f

  • Size

    247KB

  • Sample

    240516-b9bg3afc88

  • MD5

    5bf3cf878f3b16d28559adadf55cfa62

  • SHA1

    384f19244c7cf5fbb0b810e09139bfa00d6fdfe2

  • SHA256

    d55d3cb460beee2ae3c0db2a748891974e76c731f506b55a15abf30b1009ce7f

  • SHA512

    b4b440f8171807b4e3f2397b8d91bd510ed41f169cf28ffb981da825e85c0a9bca6f3d096541b9f8e03fd6a40abc57e54f74b1b4523021da8e6e9efd8a41a8f1

  • SSDEEP

    6144:vx/LcTEyF1dH3VOVw44UOisbaxHUsAxyOzk9jAdbbV:GBREcUkHxy8yA/

Malware Config

Targets

    • Target

      d55d3cb460beee2ae3c0db2a748891974e76c731f506b55a15abf30b1009ce7f

    • Size

      247KB

    • MD5

      5bf3cf878f3b16d28559adadf55cfa62

    • SHA1

      384f19244c7cf5fbb0b810e09139bfa00d6fdfe2

    • SHA256

      d55d3cb460beee2ae3c0db2a748891974e76c731f506b55a15abf30b1009ce7f

    • SHA512

      b4b440f8171807b4e3f2397b8d91bd510ed41f169cf28ffb981da825e85c0a9bca6f3d096541b9f8e03fd6a40abc57e54f74b1b4523021da8e6e9efd8a41a8f1

    • SSDEEP

      6144:vx/LcTEyF1dH3VOVw44UOisbaxHUsAxyOzk9jAdbbV:GBREcUkHxy8yA/

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks