General

  • Target

    Idle.exe

  • Size

    1.8MB

  • Sample

    240920-jyjcjaxalk

  • MD5

    9257cb2730e4744e1fd4565dec8eb3c8

  • SHA1

    a9147f6de05447b78bd78b71517a650028498836

  • SHA256

    2964966063f51dd2c3d381468a9d9091d8581442b9d63564af056274cb797061

  • SHA512

    0b2228b607a3aa0302515312ab5f9cf86b78c44b94bba7a53507afba00d55208d1387585cd8c0714a9c66831bf99036d91fb81398d6806fd2e086d6019e67e6c

  • SSDEEP

    24576:Wr5fDVgMO9SDaq+Lz04ZxDYeoaydQlceKfxPEQVKGxEvIFHJg5WIhFMwZVxTsQg:Wr5pSYeoayd0uBE0KnQFpyNbTd

Malware Config

Targets

    • Target

      Idle.exe

    • Size

      1.8MB

    • MD5

      9257cb2730e4744e1fd4565dec8eb3c8

    • SHA1

      a9147f6de05447b78bd78b71517a650028498836

    • SHA256

      2964966063f51dd2c3d381468a9d9091d8581442b9d63564af056274cb797061

    • SHA512

      0b2228b607a3aa0302515312ab5f9cf86b78c44b94bba7a53507afba00d55208d1387585cd8c0714a9c66831bf99036d91fb81398d6806fd2e086d6019e67e6c

    • SSDEEP

      24576:Wr5fDVgMO9SDaq+Lz04ZxDYeoaydQlceKfxPEQVKGxEvIFHJg5WIhFMwZVxTsQg:Wr5pSYeoayd0uBE0KnQFpyNbTd

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks