General

  • Target

    OQfFxsl.exe

  • Size

    1.6MB

  • Sample

    211021-pxynqabbel

  • MD5

    44150395748c027ef5f8eed812f620b0

  • SHA1

    0d26c44e5e93a08da7504344498d3275ca11653e

  • SHA256

    144525451ace8e714f95f6235f310b6959871e559e11f33f3164006a02832a7f

  • SHA512

    5ba96935ebacd7c4e377c3171d411e7383132eed1c087ef66c3fe1a54987f826ac9221a1f43f4cc6627d184f7621dca6858b84ae692bde127bdf9d3a7bc04a4c

Malware Config

Targets

    • Target

      OQfFxsl.exe

    • Size

      1.6MB

    • MD5

      44150395748c027ef5f8eed812f620b0

    • SHA1

      0d26c44e5e93a08da7504344498d3275ca11653e

    • SHA256

      144525451ace8e714f95f6235f310b6959871e559e11f33f3164006a02832a7f

    • SHA512

      5ba96935ebacd7c4e377c3171d411e7383132eed1c087ef66c3fe1a54987f826ac9221a1f43f4cc6627d184f7621dca6858b84ae692bde127bdf9d3a7bc04a4c

    • Registers COM server for autorun

    • Executes dropped EXE

    • Sets service image path in registry

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

3
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Remote System Discovery

1
T1018

Command and Control

Web Service

1
T1102

Tasks