General

  • Target

    0e3cef7fcb4db72d7756df8d00a84190N.exe

  • Size

    3.1MB

  • Sample

    240727-2grxfsvfrg

  • MD5

    0e3cef7fcb4db72d7756df8d00a84190

  • SHA1

    2bdbe27bafc065edab12cf70aae6d0a831995e93

  • SHA256

    939633e3fda2a9850f884f4a748a9f2867ee9da42e1fce352f3b5370a954565e

  • SHA512

    f594c9074c424d6f711375e0b5b573e025059eaa61502342dd80f02214ae0443a36a2cac75b17cfad9ecc2b935f298bd02448f6bf3cb82fc406caaa9d3439304

  • SSDEEP

    49152:+UJ6ZNXox4SgJhBsfHJq/nCFT4Mv0Pt97J:+tR4xGnCtvwd

Malware Config

Targets

    • Target

      0e3cef7fcb4db72d7756df8d00a84190N.exe

    • Size

      3.1MB

    • MD5

      0e3cef7fcb4db72d7756df8d00a84190

    • SHA1

      2bdbe27bafc065edab12cf70aae6d0a831995e93

    • SHA256

      939633e3fda2a9850f884f4a748a9f2867ee9da42e1fce352f3b5370a954565e

    • SHA512

      f594c9074c424d6f711375e0b5b573e025059eaa61502342dd80f02214ae0443a36a2cac75b17cfad9ecc2b935f298bd02448f6bf3cb82fc406caaa9d3439304

    • SSDEEP

      49152:+UJ6ZNXox4SgJhBsfHJq/nCFT4Mv0Pt97J:+tR4xGnCtvwd

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks