General

  • Target

    11c9544fc6c35f5488579168eb1953cb4d874c744dd97cc05fc0cfa5fa07b855

  • Size

    448KB

  • Sample

    220213-swgkladbfr

  • MD5

    808189ade846e9d5855baed60727ee6e

  • SHA1

    45a356565238d83b726852a4a69fa764a00c62f0

  • SHA256

    11c9544fc6c35f5488579168eb1953cb4d874c744dd97cc05fc0cfa5fa07b855

  • SHA512

    93542e23f5ffdb7bedc98b63595871d4da488d90e19e0e214de204ed11390bb61fddef239ebb51720372317da208a7aeab3d7783f5b426817a0b12993a6df010

Malware Config

Targets

    • Target

      11c9544fc6c35f5488579168eb1953cb4d874c744dd97cc05fc0cfa5fa07b855

    • Size

      448KB

    • MD5

      808189ade846e9d5855baed60727ee6e

    • SHA1

      45a356565238d83b726852a4a69fa764a00c62f0

    • SHA256

      11c9544fc6c35f5488579168eb1953cb4d874c744dd97cc05fc0cfa5fa07b855

    • SHA512

      93542e23f5ffdb7bedc98b63595871d4da488d90e19e0e214de204ed11390bb61fddef239ebb51720372317da208a7aeab3d7783f5b426817a0b12993a6df010

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • Allows Network login with blank passwords

      Allows local user accounts with blank passwords to access device from the network.

    • Modifies file permissions

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Account Manipulation

1
T1098

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

File Permissions Modification

1
T1222

Discovery

System Information Discovery

1
T1082

Lateral Movement

Remote Desktop Protocol

1
T1076

Tasks