General

  • Target

    weave.exe

  • Size

    3.4MB

  • Sample

    240921-gb4c3sxdrr

  • MD5

    19eeb3ce01f40894ced6065215d7a666

  • SHA1

    6da9fb24f7560284219c0aa42134be3d76615c7c

  • SHA256

    2c80f72b0be446e73b7f8f7e660750d8147a527b3e0c1316c2ddadc708e783c3

  • SHA512

    9ad07ec548303e7d2db20093441710f4a08725ccc2365904ab3ef670a174030733409a4b22324eece2ba472354c32ad34bd96fb9cc095696a84caac70f0ef801

  • SSDEEP

    49152:12quZB3Lyy3ok0xaAmNu2WsgAbfjHsKTJ4Nz9kP93s8+g/l7mKyftvzQBNomC6H:IHX3LyC0L7AbfjJT/l7byV4NJH

Malware Config

Targets

    • Target

      weave.exe

    • Size

      3.4MB

    • MD5

      19eeb3ce01f40894ced6065215d7a666

    • SHA1

      6da9fb24f7560284219c0aa42134be3d76615c7c

    • SHA256

      2c80f72b0be446e73b7f8f7e660750d8147a527b3e0c1316c2ddadc708e783c3

    • SHA512

      9ad07ec548303e7d2db20093441710f4a08725ccc2365904ab3ef670a174030733409a4b22324eece2ba472354c32ad34bd96fb9cc095696a84caac70f0ef801

    • SSDEEP

      49152:12quZB3Lyy3ok0xaAmNu2WsgAbfjHsKTJ4Nz9kP93s8+g/l7mKyftvzQBNomC6H:IHX3LyC0L7AbfjJT/l7byV4NJH

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks