General

  • Target

    f82f0e7836322bed4e1b8a1f7e5619562f19fc0a15747a038b314eba809e3066

  • Size

    7.2MB

  • Sample

    240704-kywtastblr

  • MD5

    0639ed183f736cdc2720fbff7f0232be

  • SHA1

    17c64a7299f09907c036f9a3e1495ccf24ef6088

  • SHA256

    f82f0e7836322bed4e1b8a1f7e5619562f19fc0a15747a038b314eba809e3066

  • SHA512

    89ea2950143b6cd521c1f326a21a19b5d256b975cb7193050d92306ff50a48f3b7d6fa256e934bae5724e387c36ed9a28c1bafee89b091c836d738797b526f51

  • SSDEEP

    196608:91O0VLeIvAdN2mWrWNYwlNvnLnEnY1JK+Or4uvWWoNCNR0q:3OGZAD2B0YmvnLigjOEuuVINl

Malware Config

Targets

    • Target

      f82f0e7836322bed4e1b8a1f7e5619562f19fc0a15747a038b314eba809e3066

    • Size

      7.2MB

    • MD5

      0639ed183f736cdc2720fbff7f0232be

    • SHA1

      17c64a7299f09907c036f9a3e1495ccf24ef6088

    • SHA256

      f82f0e7836322bed4e1b8a1f7e5619562f19fc0a15747a038b314eba809e3066

    • SHA512

      89ea2950143b6cd521c1f326a21a19b5d256b975cb7193050d92306ff50a48f3b7d6fa256e934bae5724e387c36ed9a28c1bafee89b091c836d738797b526f51

    • SSDEEP

      196608:91O0VLeIvAdN2mWrWNYwlNvnLnEnY1JK+Or4uvWWoNCNR0q:3OGZAD2B0YmvnLigjOEuuVINl

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks