General

  • Target

    2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe

  • Size

    3.5MB

  • Sample

    240806-bskz6svdpr

  • MD5

    8784f682b99ff4d525e623544ae67e24

  • SHA1

    4bc752a2fbe5964b1cdfe57f62ab80531c181912

  • SHA256

    2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d

  • SHA512

    08a376c53e2488067e6145d7583478ceef1ae7d01aeedc185d84e849fba89dd201bc8720ff291c65ceb3e4b7223fe08d2e7ae01c070ef4bf0461f3e6531eaeaf

  • SSDEEP

    98304:74qk4B+JfG/r17Z64wNlnadfucOS+MgZk:7HJr/r17Z64SaebRy

Malware Config

Targets

    • Target

      2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe

    • Size

      3.5MB

    • MD5

      8784f682b99ff4d525e623544ae67e24

    • SHA1

      4bc752a2fbe5964b1cdfe57f62ab80531c181912

    • SHA256

      2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d

    • SHA512

      08a376c53e2488067e6145d7583478ceef1ae7d01aeedc185d84e849fba89dd201bc8720ff291c65ceb3e4b7223fe08d2e7ae01c070ef4bf0461f3e6531eaeaf

    • SSDEEP

      98304:74qk4B+JfG/r17Z64wNlnadfucOS+MgZk:7HJr/r17Z64SaebRy

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks