General

  • Target

    PAP46E1UkZ.exe

  • Size

    18.4MB

  • Sample

    240524-mj5trsdg2t

  • MD5

    bb1cb5cd557cac752ccea3f4ba806709

  • SHA1

    7054b75fd5af905210178703a556fa5837b4f459

  • SHA256

    2ac633521283d233a8478547cb6f8109c6f318a1b0c8e9f822833b5c74c12b39

  • SHA512

    c21d2c7cf6907c5c4122ef0fba9ddb3faff3c98c44c18242cd348a2016b4d5365acf97cf6575931656f60f60b6810d848e02a5a021e7a57ce9d69a5a74f32de3

  • SSDEEP

    393216:DEkULrpBciidQuslrfrAZYCuPJO8z19P2uDW8B3+d9vkegs+EjY1:D85BydQu4MJuxZz1RbW8BOd9vkz/yY1

Malware Config

Targets

    • Target

      PAP46E1UkZ.exe

    • Size

      18.4MB

    • MD5

      bb1cb5cd557cac752ccea3f4ba806709

    • SHA1

      7054b75fd5af905210178703a556fa5837b4f459

    • SHA256

      2ac633521283d233a8478547cb6f8109c6f318a1b0c8e9f822833b5c74c12b39

    • SHA512

      c21d2c7cf6907c5c4122ef0fba9ddb3faff3c98c44c18242cd348a2016b4d5365acf97cf6575931656f60f60b6810d848e02a5a021e7a57ce9d69a5a74f32de3

    • SSDEEP

      393216:DEkULrpBciidQuslrfrAZYCuPJO8z19P2uDW8B3+d9vkegs+EjY1:D85BydQu4MJuxZz1RbW8BOd9vkz/yY1

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks