General

  • Target

    4c6cc49798a17cc509fab09a8f8618c869f6b1485d2fd673ba89842357b90c4e

  • Size

    892KB

  • Sample

    220520-3s54wscdar

  • MD5

    53ac2a5394f8713b3c66ba21103ff707

  • SHA1

    5e38feca1c8fba6746ad331f4d6435206007b1d0

  • SHA256

    4c6cc49798a17cc509fab09a8f8618c869f6b1485d2fd673ba89842357b90c4e

  • SHA512

    2ad8414a213082bba37b8fa191f2244d1a3b558a98cf19aaee241427410411b8f3c31daf29468458bec58de71c389f715b1fd8a2348d85b98355f85f83e3da4d

Malware Config

Targets

    • Target

      4c6cc49798a17cc509fab09a8f8618c869f6b1485d2fd673ba89842357b90c4e

    • Size

      892KB

    • MD5

      53ac2a5394f8713b3c66ba21103ff707

    • SHA1

      5e38feca1c8fba6746ad331f4d6435206007b1d0

    • SHA256

      4c6cc49798a17cc509fab09a8f8618c869f6b1485d2fd673ba89842357b90c4e

    • SHA512

      2ad8414a213082bba37b8fa191f2244d1a3b558a98cf19aaee241427410411b8f3c31daf29468458bec58de71c389f715b1fd8a2348d85b98355f85f83e3da4d

    • UAC bypass

    • Executes dropped EXE

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Tasks