General

  • Target

    NEAS.04381cf3b4597b3d6075bda97853e289074790cf1d3290d295ecdab1bb95ad0fr00_JC.rar

  • Size

    906KB

  • Sample

    231024-x3qt3agh9y

  • MD5

    b82a8c646ecc5ef5122666f5d5778877

  • SHA1

    7a973a20cb91e69a084b7fd00e3c1e7e0ccac167

  • SHA256

    04381cf3b4597b3d6075bda97853e289074790cf1d3290d295ecdab1bb95ad0f

  • SHA512

    c262d84972cb202488a5fed9fa1f188d594d6bba734f0b0415ae444cf18599ae419b808608c067059f0e5f80634f3196418ebd862c067ca30c45a425bcc97900

  • SSDEEP

    24576:X+XlEFppV9uUZl2EZZbQm2TtNKKEheu29mzNvCvvC6p25q9:uuVgUl2QZH2hNuenuOvZoQ9

Malware Config

Targets

    • Target

      DRMS Tender No. P500-2023-102.exe

    • Size

      935KB

    • MD5

      2e450823db1430464efb84f8074cc84f

    • SHA1

      88c86734e5de9f22154ca8c55cd141b2068e922f

    • SHA256

      50e8e741266264cb161b567f8dbcd65bf8cdcfea296c9807dc00a9cae853b8fe

    • SHA512

      20c2eedba61f776d90636ad6dae668ad9222c5eca9a69437587317321e3116591250b8327fd41079f892ef021fc7d37035dd1fb20617d2c8331fdab376973c2b

    • SSDEEP

      24576:UpCvo/Sfhf/+5SxYn89JnMKFpn/9IUI7ighRKA2E4jKk:iX2f/LxYnonMKHn/9K71hRjrq

    • PredatorStealer

      Predator is a modular stealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks