General

  • Target

    315e0272c25fcf22ac2b4023f6e9d02f.exe

  • Size

    2.1MB

  • Sample

    240701-e2hsyszarq

  • MD5

    315e0272c25fcf22ac2b4023f6e9d02f

  • SHA1

    c5d91607832ff900ac945ae9d030204e4de747f2

  • SHA256

    e564512cd804822bb78cb0a81de39833e283d1a26fc1c3e81402a75c98eb4e0d

  • SHA512

    b3b791cf698a333cf099aa298cd2838a7d6b8564252d48e8ef4a283efcaaa463ea8a5cfbc0f3bad9812050f22b66947e1fcbd1f53e075747532c568ed0078522

  • SSDEEP

    49152:IBJTPdd11t3B0ks2MOavodMFf6obivfxI4R8Q:ydPdbL3B/4OaQiA1vfxI4R8Q

Malware Config

Targets

    • Target

      315e0272c25fcf22ac2b4023f6e9d02f.exe

    • Size

      2.1MB

    • MD5

      315e0272c25fcf22ac2b4023f6e9d02f

    • SHA1

      c5d91607832ff900ac945ae9d030204e4de747f2

    • SHA256

      e564512cd804822bb78cb0a81de39833e283d1a26fc1c3e81402a75c98eb4e0d

    • SHA512

      b3b791cf698a333cf099aa298cd2838a7d6b8564252d48e8ef4a283efcaaa463ea8a5cfbc0f3bad9812050f22b66947e1fcbd1f53e075747532c568ed0078522

    • SSDEEP

      49152:IBJTPdd11t3B0ks2MOavodMFf6obivfxI4R8Q:ydPdbL3B/4OaQiA1vfxI4R8Q

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Modify Registry

3
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Tasks