General

  • Target

    b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf

  • Size

    239KB

  • Sample

    240920-ygny1svbpj

  • MD5

    801703cab4bc085aec4abda3595f4d40

  • SHA1

    7d9db01a7825971de68c64d9cc45e46ba10c85e4

  • SHA256

    b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf

  • SHA512

    0be1c562dbc2ba930f56341c3f1f6f7db1f0029735cc79719fdbea84cb1afda15f62c49829a96113b0d099320b593de02d022afb0cc6d1cf782333909aaba8a3

  • SSDEEP

    3072:hsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwR1l9B4hTu:GR5IuMQoseGk7RZBGxAycKpSPX2pUE

Malware Config

Targets

    • Target

      b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf

    • Size

      239KB

    • MD5

      801703cab4bc085aec4abda3595f4d40

    • SHA1

      7d9db01a7825971de68c64d9cc45e46ba10c85e4

    • SHA256

      b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf

    • SHA512

      0be1c562dbc2ba930f56341c3f1f6f7db1f0029735cc79719fdbea84cb1afda15f62c49829a96113b0d099320b593de02d022afb0cc6d1cf782333909aaba8a3

    • SSDEEP

      3072:hsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwR1l9B4hTu:GR5IuMQoseGk7RZBGxAycKpSPX2pUE

    • Modifies visiblity of hidden/system files in Explorer

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks