General

  • Target

    9bd8be1ddf1c3847995b0659911a6d5dba351504a2f752c0f4a8ae7d4b17b9a7

  • Size

    3.5MB

  • Sample

    240630-alrzgatdrn

  • MD5

    9cc535dd1c20ebb196f2638f694bd77a

  • SHA1

    ba8e1e934420c67547a68052d29bb5766c4c0b2e

  • SHA256

    9bd8be1ddf1c3847995b0659911a6d5dba351504a2f752c0f4a8ae7d4b17b9a7

  • SHA512

    8f83de7aaccd97da7d42b5f644c884d6a2c3eb9e69c4552b256d360307bb7c5bfc9ea95acd57c92ce6d161f16152d1fe3d3a64420bc4db41582c81d36c09c4a0

  • SSDEEP

    49152:cP5r8oHl3obnWR1jdak2+8LIDITWHfwkbtKCL6asof1RABJAGdZY6+FK+HGJ2:cP5SbMkTs0TlkjeWDAB9ZY6+FKD2

Malware Config

Targets

    • Target

      9bd8be1ddf1c3847995b0659911a6d5dba351504a2f752c0f4a8ae7d4b17b9a7

    • Size

      3.5MB

    • MD5

      9cc535dd1c20ebb196f2638f694bd77a

    • SHA1

      ba8e1e934420c67547a68052d29bb5766c4c0b2e

    • SHA256

      9bd8be1ddf1c3847995b0659911a6d5dba351504a2f752c0f4a8ae7d4b17b9a7

    • SHA512

      8f83de7aaccd97da7d42b5f644c884d6a2c3eb9e69c4552b256d360307bb7c5bfc9ea95acd57c92ce6d161f16152d1fe3d3a64420bc4db41582c81d36c09c4a0

    • SSDEEP

      49152:cP5r8oHl3obnWR1jdak2+8LIDITWHfwkbtKCL6asof1RABJAGdZY6+FK+HGJ2:cP5SbMkTs0TlkjeWDAB9ZY6+FKD2

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Detects executables containing bas64 encoded gzip files

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks