General

  • Target

    30f8137f89cd2a6ed4290c53d64fa955071a7c2f07d36c0df1b1472b53b406f8

  • Size

    1.2MB

  • Sample

    220211-extpnacchp

  • MD5

    e1349991d92ffeb9b5e39ee3aaaaf2d9

  • SHA1

    39a27e4bd2309801bdd7a382754d6d5af0610314

  • SHA256

    30f8137f89cd2a6ed4290c53d64fa955071a7c2f07d36c0df1b1472b53b406f8

  • SHA512

    862ff1747ba3c70050a9dc175b1114bc42e7f5814175db32ce6886c3819dad9a179516832189766880b52a988c3e260a50db666f59382c80f4dde5c2b881887d

Malware Config

Targets

    • Target

      30f8137f89cd2a6ed4290c53d64fa955071a7c2f07d36c0df1b1472b53b406f8

    • Size

      1.2MB

    • MD5

      e1349991d92ffeb9b5e39ee3aaaaf2d9

    • SHA1

      39a27e4bd2309801bdd7a382754d6d5af0610314

    • SHA256

      30f8137f89cd2a6ed4290c53d64fa955071a7c2f07d36c0df1b1472b53b406f8

    • SHA512

      862ff1747ba3c70050a9dc175b1114bc42e7f5814175db32ce6886c3819dad9a179516832189766880b52a988c3e260a50db666f59382c80f4dde5c2b881887d

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks