General

  • Target

    09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5

  • Size

    390KB

  • Sample

    210515-gzcabwmh1j

  • MD5

    4ac3edd36979050ed63490ca4d64d558

  • SHA1

    965d34311d79c178187c215fbc22ffae3d89f2fd

  • SHA256

    09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5

  • SHA512

    e4fa7ffd6433784ecf5e0e484faa2f2bdc86ff538b39028c619949f9450873c35fe3fa8915755b4cef29ee41206ef3f60aa64da0427a60ce54fc4ee32406f1fb

Malware Config

Targets

    • Target

      09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5

    • Size

      390KB

    • MD5

      4ac3edd36979050ed63490ca4d64d558

    • SHA1

      965d34311d79c178187c215fbc22ffae3d89f2fd

    • SHA256

      09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5

    • SHA512

      e4fa7ffd6433784ecf5e0e484faa2f2bdc86ff538b39028c619949f9450873c35fe3fa8915755b4cef29ee41206ef3f60aa64da0427a60ce54fc4ee32406f1fb

    • Modifies firewall policy service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Tasks