General

  • Target

    06c45ab0b5138b4244b4c800264966ab94ee4b5e06c13b58332c2cb792ca58aa

  • Size

    120KB

  • Sample

    211204-2esqzabgam

  • MD5

    3850da296f3c2596aaba5dba02f0b204

  • SHA1

    d39cb436d340ad2dc81cfeb2e2aeea21d3a22e2a

  • SHA256

    06c45ab0b5138b4244b4c800264966ab94ee4b5e06c13b58332c2cb792ca58aa

  • SHA512

    3b47e5e3caaf197e54179456fc61f709771cec77e642b5aab1c7d8b04c1d9161806d39d5866da9d4cfc3a72730aae3d17db640154de7cf771d8d04dfe3d73ee7

Malware Config

Targets

    • Target

      06c45ab0b5138b4244b4c800264966ab94ee4b5e06c13b58332c2cb792ca58aa

    • Size

      120KB

    • MD5

      3850da296f3c2596aaba5dba02f0b204

    • SHA1

      d39cb436d340ad2dc81cfeb2e2aeea21d3a22e2a

    • SHA256

      06c45ab0b5138b4244b4c800264966ab94ee4b5e06c13b58332c2cb792ca58aa

    • SHA512

      3b47e5e3caaf197e54179456fc61f709771cec77e642b5aab1c7d8b04c1d9161806d39d5866da9d4cfc3a72730aae3d17db640154de7cf771d8d04dfe3d73ee7

    • Modifies Windows Defender Real-time Protection settings

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Tasks