General

  • Target

    31bee89c955b2bb002108fc607454d8b2de98c78684877bd750a23714fea4418.exe

  • Size

    1.7MB

  • Sample

    240802-byjdjaxfnr

  • MD5

    5b80b974826d91185653064d671ddb31

  • SHA1

    968c759a0e0a6e76d8d60f8753503fd91383d34e

  • SHA256

    31bee89c955b2bb002108fc607454d8b2de98c78684877bd750a23714fea4418

  • SHA512

    d4eb1e8cc4a3e877dca24dc2df226ebd0b5655c357be6d1f75d8a468cb80c8c99e05dfef3e089b6863481531183ddd456905617c76c1592046eac6f34f1c9b03

  • SSDEEP

    49152:ABnbMnpkC5PvmjQS56LGTDGau49gymqaS:abMyC5vmjpc8u49bm7S

Malware Config

Targets

    • Target

      31bee89c955b2bb002108fc607454d8b2de98c78684877bd750a23714fea4418.exe

    • Size

      1.7MB

    • MD5

      5b80b974826d91185653064d671ddb31

    • SHA1

      968c759a0e0a6e76d8d60f8753503fd91383d34e

    • SHA256

      31bee89c955b2bb002108fc607454d8b2de98c78684877bd750a23714fea4418

    • SHA512

      d4eb1e8cc4a3e877dca24dc2df226ebd0b5655c357be6d1f75d8a468cb80c8c99e05dfef3e089b6863481531183ddd456905617c76c1592046eac6f34f1c9b03

    • SSDEEP

      49152:ABnbMnpkC5PvmjQS56LGTDGau49gymqaS:abMyC5vmjpc8u49bm7S

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks