General

  • Target

    2612726ec8d4c9a39805cc6811f329776580eec417f8b09d1e52c648f3ff14a4

  • Size

    737KB

  • Sample

    220516-p47vzaegep

  • MD5

    7178c667ec5297042edbf4d365c45413

  • SHA1

    8425cd5050637c83334e922569506f2a44f0ce9e

  • SHA256

    2612726ec8d4c9a39805cc6811f329776580eec417f8b09d1e52c648f3ff14a4

  • SHA512

    a1e7d5c4434af6977c484c46a3758c05e6c1b29672effc12f11d0abdca65dcf26cad863c1e3e435a867e43fe066062d5a6e79c3833fd22ab10b7f9d03cad13a1

Malware Config

Targets

    • Target

      2612726ec8d4c9a39805cc6811f329776580eec417f8b09d1e52c648f3ff14a4

    • Size

      737KB

    • MD5

      7178c667ec5297042edbf4d365c45413

    • SHA1

      8425cd5050637c83334e922569506f2a44f0ce9e

    • SHA256

      2612726ec8d4c9a39805cc6811f329776580eec417f8b09d1e52c648f3ff14a4

    • SHA512

      a1e7d5c4434af6977c484c46a3758c05e6c1b29672effc12f11d0abdca65dcf26cad863c1e3e435a867e43fe066062d5a6e79c3833fd22ab10b7f9d03cad13a1

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

3
T1060

Bootkit

1
T1067

Defense Evasion

Modify Registry

5
T1112

Scripting

1
T1064

Tasks