General

  • Target

    PixInsight 1.8 - E3DDY.zip

  • Size

    253.1MB

  • Sample

    240527-g3fq4abf38

  • MD5

    380735676a792880bdcff6cd48a2836c

  • SHA1

    0f48eb72c076b832ba3f6aab53d1e4771c4bd4b5

  • SHA256

    4b701365bf0d3102e9f1f066755f3d88c073e99672f95af23c1f8b52f57641c7

  • SHA512

    d8979bd588b46dd5378b34396ab4b63bbbd4ee18a787f6324f4f554f919e050a6cd366d48b45075a96d6a2f76088cbf08e6aa60da65b2de4fc537594ffe5cab4

  • SSDEEP

    6291456:jz/HlMkDV5zM2jchY91cB9HZwR5BBHjRdjqNP4IAyWw3L:jz/H7ha2j6YHhzjRdjYhDb

Malware Config

Targets

    • Target

      PixInsight 1.8 - E3DDY.zip

    • Size

      253.1MB

    • MD5

      380735676a792880bdcff6cd48a2836c

    • SHA1

      0f48eb72c076b832ba3f6aab53d1e4771c4bd4b5

    • SHA256

      4b701365bf0d3102e9f1f066755f3d88c073e99672f95af23c1f8b52f57641c7

    • SHA512

      d8979bd588b46dd5378b34396ab4b63bbbd4ee18a787f6324f4f554f919e050a6cd366d48b45075a96d6a2f76088cbf08e6aa60da65b2de4fc537594ffe5cab4

    • SSDEEP

      6291456:jz/HlMkDV5zM2jchY91cB9HZwR5BBHjRdjqNP4IAyWw3L:jz/H7ha2j6YHhzjRdjYhDb

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Blocklisted process makes network request

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

1
T1005

Tasks