General

  • Target

    78fee239cf44c2ab923669b8ccf016ef117a9682e339d96de87fa2f0a45200cc.exe

  • Size

    7.7MB

  • Sample

    241002-bq7q6atfjb

  • MD5

    58509394a423edb98b0b1be7f18551ab

  • SHA1

    4b7a8ff6ec8bd5908e306cb23d2b84ce3ff03ec3

  • SHA256

    78fee239cf44c2ab923669b8ccf016ef117a9682e339d96de87fa2f0a45200cc

  • SHA512

    41ec27bb184d55d84b3e7150df35d2229cf93ae389fc4f8b9f8bded29fb730661ddc3a21d6d926f6d98cc169e851e44928fb2058bd898d96924f69e301350b9a

  • SSDEEP

    196608:GPtx5dUAuaAxSTZLvD6/x1R92cJUMo7xS6:ctx5dUARAh5n9/GMolS6

Malware Config

Targets

    • Target

      78fee239cf44c2ab923669b8ccf016ef117a9682e339d96de87fa2f0a45200cc.exe

    • Size

      7.7MB

    • MD5

      58509394a423edb98b0b1be7f18551ab

    • SHA1

      4b7a8ff6ec8bd5908e306cb23d2b84ce3ff03ec3

    • SHA256

      78fee239cf44c2ab923669b8ccf016ef117a9682e339d96de87fa2f0a45200cc

    • SHA512

      41ec27bb184d55d84b3e7150df35d2229cf93ae389fc4f8b9f8bded29fb730661ddc3a21d6d926f6d98cc169e851e44928fb2058bd898d96924f69e301350b9a

    • SSDEEP

      196608:GPtx5dUAuaAxSTZLvD6/x1R92cJUMo7xS6:ctx5dUARAh5n9/GMolS6

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks