General

  • Target

    deb6a175d56e09e4709c73c8c40a1fb88e2cf5bee812149217c824cb0815492d

  • Size

    2.6MB

  • Sample

    220520-18k3jsaabn

  • MD5

    b12aeed252db94f858037957b35f7997

  • SHA1

    2dffcaf75338359cd039fd827556835ac9d1e212

  • SHA256

    deb6a175d56e09e4709c73c8c40a1fb88e2cf5bee812149217c824cb0815492d

  • SHA512

    d012897bd4beba65a8c65ede1a4679f671713f448305c9606de57265fad34a7bb523859fe2778216c82583cd0af7f3c8e0a892ece68b69a56651933c1e5db97a

Score
10/10

Malware Config

Targets

    • Target

      deb6a175d56e09e4709c73c8c40a1fb88e2cf5bee812149217c824cb0815492d

    • Size

      2.6MB

    • MD5

      b12aeed252db94f858037957b35f7997

    • SHA1

      2dffcaf75338359cd039fd827556835ac9d1e212

    • SHA256

      deb6a175d56e09e4709c73c8c40a1fb88e2cf5bee812149217c824cb0815492d

    • SHA512

      d012897bd4beba65a8c65ede1a4679f671713f448305c9606de57265fad34a7bb523859fe2778216c82583cd0af7f3c8e0a892ece68b69a56651933c1e5db97a

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks