General

  • Target

    9525914e09afbd3002d1b9444c4d1354c0354eec468bc112fadeafad56330248

  • Size

    290KB

  • Sample

    210515-b9nrd331bs

  • MD5

    a3b07a2df575775306338dc09671eb6d

  • SHA1

    d4171b6e51ec7b7a77721d4d9a05cee442e779c6

  • SHA256

    9525914e09afbd3002d1b9444c4d1354c0354eec468bc112fadeafad56330248

  • SHA512

    25d580ef5a105ed8c4d9c81df062c954b637632af76305fa987f0ca392be499cf376b855f4a3d30e15f86cd6b32a51dd83808339ef67277b628b77a3265cd919

Malware Config

Targets

    • Target

      9525914e09afbd3002d1b9444c4d1354c0354eec468bc112fadeafad56330248

    • Size

      290KB

    • MD5

      a3b07a2df575775306338dc09671eb6d

    • SHA1

      d4171b6e51ec7b7a77721d4d9a05cee442e779c6

    • SHA256

      9525914e09afbd3002d1b9444c4d1354c0354eec468bc112fadeafad56330248

    • SHA512

      25d580ef5a105ed8c4d9c81df062c954b637632af76305fa987f0ca392be499cf376b855f4a3d30e15f86cd6b32a51dd83808339ef67277b628b77a3265cd919

    • Modifies firewall policy service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

2
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks