General

  • Target

    49783acdb261c20342650c50de66e30d.zip

  • Size

    139KB

  • Sample

    240901-dpr1eszelm

  • MD5

    242d8e0890d359e039848ae73aa753f2

  • SHA1

    fca35c31102b652633e515cdc6d90c5ac0ac3482

  • SHA256

    9f724731fd6bb797a62bec03eb332badacfa9ea2313d4a62446cc1679d2e4505

  • SHA512

    237f49321864172ec0dbdd51eb99ccc4bfca93d2cff7d7f5db0a0e7d748b6f10813b9b2cb6132d01e85548cebdb66e92c4fba1ff567352abf363579a26be72b1

  • SSDEEP

    3072:yZdWGRvKExkaqXJDeQabR1do7f/6pp/LcLrz6mGoKGi1PdU:0dDSExXqtrmjo7K7yudU

Malware Config

Targets

    • Target

      12bb25ef1a2b4e1b253809de0b4f34262e3520b381048fc8e15c46e864aec8b3

    • Size

      223KB

    • MD5

      49783acdb261c20342650c50de66e30d

    • SHA1

      7b2e63cd2485e25d3795a662a914e6460b0c9d1e

    • SHA256

      12bb25ef1a2b4e1b253809de0b4f34262e3520b381048fc8e15c46e864aec8b3

    • SHA512

      ed2a5730603894083070636ad3d2399e221f3ef970422d7a25416ab7857dc02556e5fde0080a698a4d1b51eef9f9ae0af8c2bcc5920999b1f3b0d340a21d8eca

    • SSDEEP

      3072:YsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwRmxa:ZR5IuMQoseGk7RZBGxAycKpSPX2wa

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks