General

  • Target

    vanity.exe

  • Size

    3.4MB

  • Sample

    240825-qvfwkaycqm

  • MD5

    a5a9cde94b59bc5b8b88d60fc28177d3

  • SHA1

    aba15bc72cdeb915369b481926676f0a452d6dcc

  • SHA256

    4ddd25095cce5dadc01782611513331e9fb1e37746adc5501a5b27c2b7aecfa6

  • SHA512

    31b3a40e94319011702b680ec2623ab8132928dade90694027c471dc11304251f2880ee151ce1e42cc1da2880bb03b279bbcb617b9c723fe776ba35d13a1bb62

  • SSDEEP

    98304:gWHg7lN8JPnn6JckFDpcistUDpLfZpkSvbE:gVlkEpfsqlYeo

Malware Config

Targets

    • Target

      vanity.exe

    • Size

      3.4MB

    • MD5

      a5a9cde94b59bc5b8b88d60fc28177d3

    • SHA1

      aba15bc72cdeb915369b481926676f0a452d6dcc

    • SHA256

      4ddd25095cce5dadc01782611513331e9fb1e37746adc5501a5b27c2b7aecfa6

    • SHA512

      31b3a40e94319011702b680ec2623ab8132928dade90694027c471dc11304251f2880ee151ce1e42cc1da2880bb03b279bbcb617b9c723fe776ba35d13a1bb62

    • SSDEEP

      98304:gWHg7lN8JPnn6JckFDpcistUDpLfZpkSvbE:gVlkEpfsqlYeo

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks