General

  • Target

    b257911d5debbeced8ec162a06760ce49819001a02b5f508d4305f8ef9701df2

  • Size

    424KB

  • Sample

    220213-na59lshbg6

  • MD5

    afeac971ffe5bab0bf3da53291b523fe

  • SHA1

    f1686e5d05dfb82662cea2907b2e9685d6641755

  • SHA256

    b257911d5debbeced8ec162a06760ce49819001a02b5f508d4305f8ef9701df2

  • SHA512

    a065544135927cd13c547faf19e0135e7ad3f84b503f99ae4f82628643aadca6eabfa3ab7025bbc9f1efce854b6114db71d63cac8ff20b789d3385f238d1cd04

Malware Config

Targets

    • Target

      b257911d5debbeced8ec162a06760ce49819001a02b5f508d4305f8ef9701df2

    • Size

      424KB

    • MD5

      afeac971ffe5bab0bf3da53291b523fe

    • SHA1

      f1686e5d05dfb82662cea2907b2e9685d6641755

    • SHA256

      b257911d5debbeced8ec162a06760ce49819001a02b5f508d4305f8ef9701df2

    • SHA512

      a065544135927cd13c547faf19e0135e7ad3f84b503f99ae4f82628643aadca6eabfa3ab7025bbc9f1efce854b6114db71d63cac8ff20b789d3385f238d1cd04

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • Allows Network login with blank passwords

      Allows local user accounts with blank passwords to access device from the network.

    • Modifies file permissions

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

File Permissions Modification

1
T1222

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Lateral Movement

Remote Desktop Protocol

1
T1076

Tasks