General

  • Target

    d4720b0f4f0f0f973cc5c5e2e7c984104f1364c30c522cf0cc519543c0e5bee3

  • Size

    163KB

  • Sample

    210505-pcc7hzkp5x

  • MD5

    ec74b52408dd877e1a45f400617e10ed

  • SHA1

    9b01b5ab1b79815518f1bde614b689deaec2ca38

  • SHA256

    d4720b0f4f0f0f973cc5c5e2e7c984104f1364c30c522cf0cc519543c0e5bee3

  • SHA512

    208d5a3150762f6524bd4f632749ef7a94d4d61babc7bb27563baab372917c705df7f6d15a41f6aa691a089992165a3c6469a264e765fa5ca07b061a5074956a

Score
10/10

Malware Config

Targets

    • Target

      d4720b0f4f0f0f973cc5c5e2e7c984104f1364c30c522cf0cc519543c0e5bee3

    • Size

      163KB

    • MD5

      ec74b52408dd877e1a45f400617e10ed

    • SHA1

      9b01b5ab1b79815518f1bde614b689deaec2ca38

    • SHA256

      d4720b0f4f0f0f973cc5c5e2e7c984104f1364c30c522cf0cc519543c0e5bee3

    • SHA512

      208d5a3150762f6524bd4f632749ef7a94d4d61babc7bb27563baab372917c705df7f6d15a41f6aa691a089992165a3c6469a264e765fa5ca07b061a5074956a

    Score
    10/10
    • Modifies firewall policy service

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Discovery

System Information Discovery

2
T1082

Tasks