General

  • Target

    2dc9bd6ddc22b244f6b94ae0c9c23073c8942a5bb5663dc298cd56a9f4e02cf8

  • Size

    120KB

  • Sample

    220520-2lm43aafbm

  • MD5

    b03c60229836a25ed02c941f8a170a18

  • SHA1

    c610255e9912872193fafaba4f78ce2005d54aab

  • SHA256

    2dc9bd6ddc22b244f6b94ae0c9c23073c8942a5bb5663dc298cd56a9f4e02cf8

  • SHA512

    fe61e0c5bb1aa65fe585398426aca12275f94e33a50d1dbbcefd108f9cb1d3b4bd9d33785de1b046af7e7c5ac6bc1f79f4c219d4c44795e0662df376781ac24a

Malware Config

Targets

    • Target

      2dc9bd6ddc22b244f6b94ae0c9c23073c8942a5bb5663dc298cd56a9f4e02cf8

    • Size

      120KB

    • MD5

      b03c60229836a25ed02c941f8a170a18

    • SHA1

      c610255e9912872193fafaba4f78ce2005d54aab

    • SHA256

      2dc9bd6ddc22b244f6b94ae0c9c23073c8942a5bb5663dc298cd56a9f4e02cf8

    • SHA512

      fe61e0c5bb1aa65fe585398426aca12275f94e33a50d1dbbcefd108f9cb1d3b4bd9d33785de1b046af7e7c5ac6bc1f79f4c219d4c44795e0662df376781ac24a

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

5
T1112

Discovery

System Information Discovery

1
T1082

Tasks