General

  • Target

    1e8bbeb22236d4019e7c178efdbbccbbe37b13b5c5094268d80d2920f2310b61

  • Size

    759KB

  • Sample

    210516-zrjv4h8r6n

  • MD5

    6898211d86ec424227f1c92b80dd35a0

  • SHA1

    08e38fc8f8640f7c69c976316bf8b3cde1fcc265

  • SHA256

    1e8bbeb22236d4019e7c178efdbbccbbe37b13b5c5094268d80d2920f2310b61

  • SHA512

    75798984800d11e06a6780e05dc078a3ca4f3997b7e7e10a142993eab1baa7669c685add158eb55af3c56a06dc563599fa6720625a45647e6b1223fbbe6cd8f6

Malware Config

Targets

    • Target

      1e8bbeb22236d4019e7c178efdbbccbbe37b13b5c5094268d80d2920f2310b61

    • Size

      759KB

    • MD5

      6898211d86ec424227f1c92b80dd35a0

    • SHA1

      08e38fc8f8640f7c69c976316bf8b3cde1fcc265

    • SHA256

      1e8bbeb22236d4019e7c178efdbbccbbe37b13b5c5094268d80d2920f2310b61

    • SHA512

      75798984800d11e06a6780e05dc078a3ca4f3997b7e7e10a142993eab1baa7669c685add158eb55af3c56a06dc563599fa6720625a45647e6b1223fbbe6cd8f6

    • Modifies firewall policy service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Tasks