General

  • Target

    46f4910316829f2386f742c69fdcfc147d9b606360b771d9386dfdfe82fcd621

  • Size

    2.5MB

  • Sample

    220420-k55psaedf8

  • MD5

    74fccc2acf0de830654ab8faf4b51aab

  • SHA1

    9e20d74aa6c627435a9250827a6f15ecb2b4dce7

  • SHA256

    46f4910316829f2386f742c69fdcfc147d9b606360b771d9386dfdfe82fcd621

  • SHA512

    b3b35ef509b3c92a612c00d2004a27bf17d9a403346d07337ead4d6299c556f6d136cc88e396257734d456cfeb41c7cfc83f8054e2a665096776359e52f6a510

Malware Config

Targets

    • Target

      46f4910316829f2386f742c69fdcfc147d9b606360b771d9386dfdfe82fcd621

    • Size

      2.5MB

    • MD5

      74fccc2acf0de830654ab8faf4b51aab

    • SHA1

      9e20d74aa6c627435a9250827a6f15ecb2b4dce7

    • SHA256

      46f4910316829f2386f742c69fdcfc147d9b606360b771d9386dfdfe82fcd621

    • SHA512

      b3b35ef509b3c92a612c00d2004a27bf17d9a403346d07337ead4d6299c556f6d136cc88e396257734d456cfeb41c7cfc83f8054e2a665096776359e52f6a510

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Account Manipulation

1
T1098

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

File Permissions Modification

1
T1222

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks