General

  • Target

    ff769e5742cd29ad43c72253f2ccac27832710be32f44cb0a7d91a626ac72645

  • Size

    797KB

  • Sample

    201108-6xnjm1kt5e

  • MD5

    d359ddfb5765789a694878a3c2138c78

  • SHA1

    5d50b7ad689cb9efd42b1719fdcf937c1f80e2e9

  • SHA256

    ff769e5742cd29ad43c72253f2ccac27832710be32f44cb0a7d91a626ac72645

  • SHA512

    aa7762b2deef07a5dce55743242cfb7726ebbf5a2796e89bb50fcc0d7e1ae4b8c7c0f8651f42675bcdae2669228a500bdf2e5f09ef00e4250843e671f20443c5

Score
10/10

Malware Config

Targets

    • Target

      ff769e5742cd29ad43c72253f2ccac27832710be32f44cb0a7d91a626ac72645

    • Size

      797KB

    • MD5

      d359ddfb5765789a694878a3c2138c78

    • SHA1

      5d50b7ad689cb9efd42b1719fdcf937c1f80e2e9

    • SHA256

      ff769e5742cd29ad43c72253f2ccac27832710be32f44cb0a7d91a626ac72645

    • SHA512

      aa7762b2deef07a5dce55743242cfb7726ebbf5a2796e89bb50fcc0d7e1ae4b8c7c0f8651f42675bcdae2669228a500bdf2e5f09ef00e4250843e671f20443c5

    Score
    10/10
    • Modifies firewall policy service

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Tasks