General

  • Target

    faeac7944c42218d2d5a569ebc5e1ab1569ab5185bbf5b74916ad21e8819a3e0

  • Size

    80KB

  • Sample

    220415-kygdlseehj

  • MD5

    6f8cca4956ffc5794f7bbbc63f85bca8

  • SHA1

    67f0c4f9aedc316566e11d0cb3018d634aa65e9c

  • SHA256

    faeac7944c42218d2d5a569ebc5e1ab1569ab5185bbf5b74916ad21e8819a3e0

  • SHA512

    60591958b3dd71357810c635257d2eb6dfbecca5f90daa2157fa8f56994752990bd8e9a2355383cca54b69a73a95d7352cacd34f2d5269f722d56dee3b15bd30

Malware Config

Targets

    • Target

      faeac7944c42218d2d5a569ebc5e1ab1569ab5185bbf5b74916ad21e8819a3e0

    • Size

      80KB

    • MD5

      6f8cca4956ffc5794f7bbbc63f85bca8

    • SHA1

      67f0c4f9aedc316566e11d0cb3018d634aa65e9c

    • SHA256

      faeac7944c42218d2d5a569ebc5e1ab1569ab5185bbf5b74916ad21e8819a3e0

    • SHA512

      60591958b3dd71357810c635257d2eb6dfbecca5f90daa2157fa8f56994752990bd8e9a2355383cca54b69a73a95d7352cacd34f2d5269f722d56dee3b15bd30

    • UAC bypass

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Modifies file permissions

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

File Permissions Modification

1
T1222

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks