General

  • Target

    аываыва.exe

  • Size

    1.7MB

  • Sample

    240625-pygftszhkh

  • MD5

    e883aa197df2a5c995a18dad90445a7c

  • SHA1

    725be81650d3b8871e368cecdc075232f43bfb50

  • SHA256

    bc2d054327e6af67215b4d20d58d81f36ab36181c90555e21f89159817a3a1c7

  • SHA512

    7dfb1ca994700301fa5f8ee8d6424930871bcb5c36c313f1b9d183a629044f3db44165295ce4b63e88f72735bc3e71420396a0f73f4613d443f46ecddafe132b

  • SSDEEP

    24576:2TbBv5rUyXVLtrDzJ8ZUZF79nxIc1k8HAPvh9TOCnyeek9+N2jCszEV1S2qxA:IBJJrUCZIc1k8HGTZSk8N2jCXVk2q6

Malware Config

Targets

    • Target

      аываыва.exe

    • Size

      1.7MB

    • MD5

      e883aa197df2a5c995a18dad90445a7c

    • SHA1

      725be81650d3b8871e368cecdc075232f43bfb50

    • SHA256

      bc2d054327e6af67215b4d20d58d81f36ab36181c90555e21f89159817a3a1c7

    • SHA512

      7dfb1ca994700301fa5f8ee8d6424930871bcb5c36c313f1b9d183a629044f3db44165295ce4b63e88f72735bc3e71420396a0f73f4613d443f46ecddafe132b

    • SSDEEP

      24576:2TbBv5rUyXVLtrDzJ8ZUZF79nxIc1k8HAPvh9TOCnyeek9+N2jCszEV1S2qxA:IBJJrUCZIc1k8HGTZSk8N2jCXVk2q6

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks