General

  • Target

    c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a

  • Size

    256KB

  • Sample

    210515-eg1w48vcmn

  • MD5

    f9357a88b1a7f26e732e7a8f6cfca22c

  • SHA1

    f07f1628ce975f99b86384326173755253855655

  • SHA256

    c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a

  • SHA512

    2e2ffd27e058e57453a31a9a0bee5a63e5413efbf6a0307fba6338fa778b0ed786e68b2c8de1190ebb266cd4cce8d0afd4dcb86c184b181ec5ac4ee1c52fa0ad

Malware Config

Targets

    • Target

      c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a

    • Size

      256KB

    • MD5

      f9357a88b1a7f26e732e7a8f6cfca22c

    • SHA1

      f07f1628ce975f99b86384326173755253855655

    • SHA256

      c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a

    • SHA512

      2e2ffd27e058e57453a31a9a0bee5a63e5413efbf6a0307fba6338fa778b0ed786e68b2c8de1190ebb266cd4cce8d0afd4dcb86c184b181ec5ac4ee1c52fa0ad

    • Modifies firewall policy service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Tasks