General

  • Target

    b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950

  • Size

    603KB

  • Sample

    220520-2v5epsgah4

  • MD5

    202a640b5da9a32d7050cf39eb0f7726

  • SHA1

    d499984e6bd951514997ded82485e10844b329f6

  • SHA256

    b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950

  • SHA512

    20d46542201adab3da36a971f35cee594036ec3164bc990f9b7bba3b8a8d82c69e323a7b445b9a4045e4e3266e70e1b885d7c78e30ca34bdb111b2966ddb41c0

Score
10/10

Malware Config

Targets

    • Target

      b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950

    • Size

      603KB

    • MD5

      202a640b5da9a32d7050cf39eb0f7726

    • SHA1

      d499984e6bd951514997ded82485e10844b329f6

    • SHA256

      b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950

    • SHA512

      20d46542201adab3da36a971f35cee594036ec3164bc990f9b7bba3b8a8d82c69e323a7b445b9a4045e4e3266e70e1b885d7c78e30ca34bdb111b2966ddb41c0

    Score
    10/10
    • UAC bypass

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks