General

  • Target

    81bead4423c9e57e06a288cd5bf693980d602facccf8485f3c090b64463ca320

  • Size

    7.3MB

  • Sample

    240711-2jjzmazcmb

  • MD5

    99d63e380c13cf5e7bfe674c59a53364

  • SHA1

    4033eef65935c48b3faa5a808e7bde0938c394d1

  • SHA256

    81bead4423c9e57e06a288cd5bf693980d602facccf8485f3c090b64463ca320

  • SHA512

    bbd8a5d6b71aaa3827248276de557ba59f573ec6aeb73c1ed304eec4fac16d96f3d62be2120ed72b24c13d1164e6c240e8ec055596a74178170df0835155f476

  • SSDEEP

    196608:91OUbVkqHA4UO4qICSq2HvzSzJa2t5Wm3z5gF6cJsY5klgcFik2:3Ouo1qIZPma2t5WOzWp/klgcy

Malware Config

Targets

    • Target

      81bead4423c9e57e06a288cd5bf693980d602facccf8485f3c090b64463ca320

    • Size

      7.3MB

    • MD5

      99d63e380c13cf5e7bfe674c59a53364

    • SHA1

      4033eef65935c48b3faa5a808e7bde0938c394d1

    • SHA256

      81bead4423c9e57e06a288cd5bf693980d602facccf8485f3c090b64463ca320

    • SHA512

      bbd8a5d6b71aaa3827248276de557ba59f573ec6aeb73c1ed304eec4fac16d96f3d62be2120ed72b24c13d1164e6c240e8ec055596a74178170df0835155f476

    • SSDEEP

      196608:91OUbVkqHA4UO4qICSq2HvzSzJa2t5Wm3z5gF6cJsY5klgcFik2:3Ouo1qIZPma2t5WOzWp/klgcy

    • Modifies Windows Defender Real-time Protection settings

    • Windows security bypass

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks