General

  • Target

    IIMG_00172424.exe

  • Size

    716KB

  • Sample

    240724-hr38patcql

  • MD5

    12357dcb00ad3f1bf0775ff13cf0084d

  • SHA1

    28d9a79a4e18c87f4e76daa8da996e755cbf7850

  • SHA256

    7ed9a3c3e7a0edc6a81e2b326832a8d3a27a192131861cbfc616d87e6eff642a

  • SHA512

    cd26cba1a32f4b0a9dc15baf6eee7c5d2a3943e8a7f65bbd5e6dc69747bf3edaef38af6aa2be832939a9bd16b762e0dc8ad85e3ee707fc311e5cad8c7c473126

  • SSDEEP

    12288:GuCSY+aZrwra6Cgrdm8Kyjlp3432YCdMi2s/PlEkJQ40bPscBy5z43yFJ0tlYB:4/4ra6CIm8KqfzIe3JQ40TtBqkCFJ0t

Malware Config

Targets

    • Target

      IIMG_00172424.exe

    • Size

      716KB

    • MD5

      12357dcb00ad3f1bf0775ff13cf0084d

    • SHA1

      28d9a79a4e18c87f4e76daa8da996e755cbf7850

    • SHA256

      7ed9a3c3e7a0edc6a81e2b326832a8d3a27a192131861cbfc616d87e6eff642a

    • SHA512

      cd26cba1a32f4b0a9dc15baf6eee7c5d2a3943e8a7f65bbd5e6dc69747bf3edaef38af6aa2be832939a9bd16b762e0dc8ad85e3ee707fc311e5cad8c7c473126

    • SSDEEP

      12288:GuCSY+aZrwra6Cgrdm8Kyjlp3432YCdMi2s/PlEkJQ40bPscBy5z43yFJ0tlYB:4/4ra6CIm8KqfzIe3JQ40TtBqkCFJ0t

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks