General

  • Target

    dd3edd0a584fff1f7eadd86f868eeda95f05138caf70c5ba8d807af2f8390887

  • Size

    2.9MB

  • Sample

    220515-1f4n7aaehk

  • MD5

    69669d80ee67ca88c2c636c5f4e567ac

  • SHA1

    7854501a76d59ad31844330782db017b2d8ea8a5

  • SHA256

    dd3edd0a584fff1f7eadd86f868eeda95f05138caf70c5ba8d807af2f8390887

  • SHA512

    024a27a001c18276c7e6863119d3fbe72eb7157be9142bca5e1b058e52abf61648251896460a1c43ac02a8bf790201a1ed770ae37b2d20e4e2f01f7d9319bf4c

Malware Config

Targets

    • Target

      dd3edd0a584fff1f7eadd86f868eeda95f05138caf70c5ba8d807af2f8390887

    • Size

      2.9MB

    • MD5

      69669d80ee67ca88c2c636c5f4e567ac

    • SHA1

      7854501a76d59ad31844330782db017b2d8ea8a5

    • SHA256

      dd3edd0a584fff1f7eadd86f868eeda95f05138caf70c5ba8d807af2f8390887

    • SHA512

      024a27a001c18276c7e6863119d3fbe72eb7157be9142bca5e1b058e52abf61648251896460a1c43ac02a8bf790201a1ed770ae37b2d20e4e2f01f7d9319bf4c

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Account Manipulation

1
T1098

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

File Permissions Modification

1
T1222

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Lateral Movement

Remote Desktop Protocol

1
T1076

Tasks