General

  • Target

    dab6a6d06595504920e4b8df3ed14906e84b23cf705391a1dc095bcb24155d94

  • Size

    300KB

  • Sample

    210516-wwn3c3wejs

  • MD5

    890fde4a1d65e04af6deb530fc7abb9c

  • SHA1

    b77256ee6cc61e0775a6f44286b43484ee9deeff

  • SHA256

    dab6a6d06595504920e4b8df3ed14906e84b23cf705391a1dc095bcb24155d94

  • SHA512

    231dfc841600a1e8fd8639d4cf838fa3df75a39cc008996b51d2f7ede93a8ae60cabe57957158d635f811c30b27a655104cfe11326cb3c82a89b16699555e44a

Malware Config

Targets

    • Target

      dab6a6d06595504920e4b8df3ed14906e84b23cf705391a1dc095bcb24155d94

    • Size

      300KB

    • MD5

      890fde4a1d65e04af6deb530fc7abb9c

    • SHA1

      b77256ee6cc61e0775a6f44286b43484ee9deeff

    • SHA256

      dab6a6d06595504920e4b8df3ed14906e84b23cf705391a1dc095bcb24155d94

    • SHA512

      231dfc841600a1e8fd8639d4cf838fa3df75a39cc008996b51d2f7ede93a8ae60cabe57957158d635f811c30b27a655104cfe11326cb3c82a89b16699555e44a

    • Modifies firewall policy service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Tasks