General

  • Target

    bot_start.exe

  • Size

    2.5MB

  • Sample

    240523-dmbwesbf7v

  • MD5

    62dec8c537e3aa76b294ab744b20d245

  • SHA1

    1f4ec4852cd84d32a0d26ba0e163a373811eaebd

  • SHA256

    cc97b59379bc6eafe5c5c9dc66f16d4795270e01dce613652359bc852ba0665a

  • SHA512

    f47bbf3260f0124ec947b3a37ce316700481a8c4d5d984c9012df85673eb0d2c8777396e5a957cfc900ed509045e50d196558e931a84df146115e950abd8f6a7

  • SSDEEP

    49152:SNkG6I1nPFf56dv26ot3VwBtF+kze3xqH1Hm4I6qxOli96Jyn5tzEde3Yx:S/fP9se6ot3VwBtF+kzeQHMdLcK6EtzY

Malware Config

Targets

    • Target

      bot_start.exe

    • Size

      2.5MB

    • MD5

      62dec8c537e3aa76b294ab744b20d245

    • SHA1

      1f4ec4852cd84d32a0d26ba0e163a373811eaebd

    • SHA256

      cc97b59379bc6eafe5c5c9dc66f16d4795270e01dce613652359bc852ba0665a

    • SHA512

      f47bbf3260f0124ec947b3a37ce316700481a8c4d5d984c9012df85673eb0d2c8777396e5a957cfc900ed509045e50d196558e931a84df146115e950abd8f6a7

    • SSDEEP

      49152:SNkG6I1nPFf56dv26ot3VwBtF+kze3xqH1Hm4I6qxOli96Jyn5tzEde3Yx:S/fP9se6ot3VwBtF+kzeQHMdLcK6EtzY

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks