General

  • Target

    bb7db15dd1e104cb3454a80a832644fe63d51d22db09f9e627acfe987c884ed3

  • Size

    71KB

  • Sample

    210515-wwxpvfszpx

  • MD5

    f11ea176f38efd18006e8c8b12e9ae57

  • SHA1

    8b0b7ac1a569e9ae063eca5a21dba06ca8caee6f

  • SHA256

    bb7db15dd1e104cb3454a80a832644fe63d51d22db09f9e627acfe987c884ed3

  • SHA512

    9facdf0abb96a51851e4fd10c2aa0a7e8f1500b82f9052d9c7222df604e50c861542f937fa60ece9316c003b56925245ac4ed61346ed35e4ec7da4c8084894e9

Malware Config

Targets

    • Target

      bb7db15dd1e104cb3454a80a832644fe63d51d22db09f9e627acfe987c884ed3

    • Size

      71KB

    • MD5

      f11ea176f38efd18006e8c8b12e9ae57

    • SHA1

      8b0b7ac1a569e9ae063eca5a21dba06ca8caee6f

    • SHA256

      bb7db15dd1e104cb3454a80a832644fe63d51d22db09f9e627acfe987c884ed3

    • SHA512

      9facdf0abb96a51851e4fd10c2aa0a7e8f1500b82f9052d9c7222df604e50c861542f937fa60ece9316c003b56925245ac4ed61346ed35e4ec7da4c8084894e9

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks