General

  • Target

    https://drive.google.com/drive/folders/1AMYiBcKM44SMngrOLIazvvlxJiZe5npf

  • Sample

    250126-g5dphswkan

Malware Config

Targets

    • Target

      https://drive.google.com/drive/folders/1AMYiBcKM44SMngrOLIazvvlxJiZe5npf

    • Modifies boot configuration data using bcdedit

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks