General

  • Target

    16a0bd2dadf13568bd4c8a25f6061ca2237833a7ccbafddecbc68ac739665100.exe

  • Size

    5.6MB

  • Sample

    240823-bhr1qszdpm

  • MD5

    4a389c958e4a3e41c5d5540568503ee2

  • SHA1

    a9df8b991266cc4eccd71b90f53403ac17b26eab

  • SHA256

    16a0bd2dadf13568bd4c8a25f6061ca2237833a7ccbafddecbc68ac739665100

  • SHA512

    beb91dbdef0cecb5c9d69c13c2a352ef853e250a0952df0804441ea37c4249bb77cdc537b1990fea4b3c279e60ca2894a26956a67539689ba0717aaddd803b3e

  • SSDEEP

    98304:BJwAsH3Dsg8Ui7to9/gbzMO+KYfQM9N+T5vLD:BJwAszVUI/2zMO+8MGlLD

Malware Config

Targets

    • Target

      16a0bd2dadf13568bd4c8a25f6061ca2237833a7ccbafddecbc68ac739665100.exe

    • Size

      5.6MB

    • MD5

      4a389c958e4a3e41c5d5540568503ee2

    • SHA1

      a9df8b991266cc4eccd71b90f53403ac17b26eab

    • SHA256

      16a0bd2dadf13568bd4c8a25f6061ca2237833a7ccbafddecbc68ac739665100

    • SHA512

      beb91dbdef0cecb5c9d69c13c2a352ef853e250a0952df0804441ea37c4249bb77cdc537b1990fea4b3c279e60ca2894a26956a67539689ba0717aaddd803b3e

    • SSDEEP

      98304:BJwAsH3Dsg8Ui7to9/gbzMO+KYfQM9N+T5vLD:BJwAszVUI/2zMO+8MGlLD

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks