General

  • Target

    start.exea

  • Size

    804KB

  • Sample

    210310-dsgrarwfjn

  • MD5

    32f3be8697cbd7c40c05ee83318ae14c

  • SHA1

    9e58be40a590755bfb204d2d2f40d2de26bf4542

  • SHA256

    6c747049b34b13fee03f951bc3b0f330aab130d3f1ecd4e39df734a94d4442d1

  • SHA512

    9b2a9afdc989e77e0a6cdd283b41958b2bb2162c1ff4a711c5f54c935d0c7628516f85ff64fe5d6e5dfed5175ceb4e3b0a01d18ee606a1d2ff293b09da0ecabb

Score
10/10

Malware Config

Targets

    • Target

      start.exea

    • Size

      804KB

    • MD5

      32f3be8697cbd7c40c05ee83318ae14c

    • SHA1

      9e58be40a590755bfb204d2d2f40d2de26bf4542

    • SHA256

      6c747049b34b13fee03f951bc3b0f330aab130d3f1ecd4e39df734a94d4442d1

    • SHA512

      9b2a9afdc989e77e0a6cdd283b41958b2bb2162c1ff4a711c5f54c935d0c7628516f85ff64fe5d6e5dfed5175ceb4e3b0a01d18ee606a1d2ff293b09da0ecabb

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Modifies file permissions

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Tasks