General

  • Target

    337de1739b18e91de064e9f50fa0eb5552afe069012812b6ce29be3b96dcd341

  • Size

    494KB

  • Sample

    210515-er6vp4n292

  • MD5

    46ccdac4f0bbc0b6c8a411db9b058644

  • SHA1

    5e69d0047113d4939cb909f5db0700f9e843ba44

  • SHA256

    337de1739b18e91de064e9f50fa0eb5552afe069012812b6ce29be3b96dcd341

  • SHA512

    292b5ce3c7aba52a53fc756489dd82d48d93891334265478c1a4ace98c18cbc4ee1622e3889f8a9e783c7655585327769e7b28721edd5ff4c31ede206eb16a89

Malware Config

Targets

    • Target

      337de1739b18e91de064e9f50fa0eb5552afe069012812b6ce29be3b96dcd341

    • Size

      494KB

    • MD5

      46ccdac4f0bbc0b6c8a411db9b058644

    • SHA1

      5e69d0047113d4939cb909f5db0700f9e843ba44

    • SHA256

      337de1739b18e91de064e9f50fa0eb5552afe069012812b6ce29be3b96dcd341

    • SHA512

      292b5ce3c7aba52a53fc756489dd82d48d93891334265478c1a4ace98c18cbc4ee1622e3889f8a9e783c7655585327769e7b28721edd5ff4c31ede206eb16a89

    • Modifies firewall policy service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Tasks