General

  • Target

    SecurityHealthSystray.exe

  • Size

    1.5MB

  • Sample

    241129-qnqr7aslcl

  • MD5

    b0b618706bd5dc3ee0c7ea5df4141994

  • SHA1

    5c2fd255b837ec3e9e31f26906fc84c4f7915efd

  • SHA256

    d120c80694d06777d054968a966a04f6d83ac40cd45da47945bd118d00bcdf93

  • SHA512

    5d539c7df1c16b190822e0eedf8df217508d8c282011fd9b33673e067c5f122ce929f55942be8d24fd6cb32c2897963687fb44544e5e493fcbb9542380058a10

  • SSDEEP

    12288:10VtAsf/qHLHH70mLicSl6/xtdd7jJ04GrbhXC2ip7sf5PVle8isq:cfkZXbb+rbVC207suP

Malware Config

Targets

    • Target

      SecurityHealthSystray.exe

    • Size

      1.5MB

    • MD5

      b0b618706bd5dc3ee0c7ea5df4141994

    • SHA1

      5c2fd255b837ec3e9e31f26906fc84c4f7915efd

    • SHA256

      d120c80694d06777d054968a966a04f6d83ac40cd45da47945bd118d00bcdf93

    • SHA512

      5d539c7df1c16b190822e0eedf8df217508d8c282011fd9b33673e067c5f122ce929f55942be8d24fd6cb32c2897963687fb44544e5e493fcbb9542380058a10

    • SSDEEP

      12288:10VtAsf/qHLHH70mLicSl6/xtdd7jJ04GrbhXC2ip7sf5PVle8isq:cfkZXbb+rbVC207suP

    • Modifies WinLogon for persistence

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks