General

  • Target

    e505db3a1f3cc707a092462ba3997f54f6c125cbc8f502d0f33bf8e3b5f3962f

  • Size

    2.4MB

  • Sample

    220520-g4vawaggdr

  • MD5

    c9d8d20830f3b513e9c07c6f7d3b9270

  • SHA1

    ef53837929f88ecc9aeb2d16bed2940eb8175d03

  • SHA256

    e505db3a1f3cc707a092462ba3997f54f6c125cbc8f502d0f33bf8e3b5f3962f

  • SHA512

    d8cf1ac44e1df0ff3bae6edfa2f59172576f02303709f4508de83916158c835599209942d5c8b3f4bbf32f5d872844ce1253c19cc4c8a4e565d32074c971123c

Malware Config

Targets

    • Target

      e505db3a1f3cc707a092462ba3997f54f6c125cbc8f502d0f33bf8e3b5f3962f

    • Size

      2.4MB

    • MD5

      c9d8d20830f3b513e9c07c6f7d3b9270

    • SHA1

      ef53837929f88ecc9aeb2d16bed2940eb8175d03

    • SHA256

      e505db3a1f3cc707a092462ba3997f54f6c125cbc8f502d0f33bf8e3b5f3962f

    • SHA512

      d8cf1ac44e1df0ff3bae6edfa2f59172576f02303709f4508de83916158c835599209942d5c8b3f4bbf32f5d872844ce1253c19cc4c8a4e565d32074c971123c

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Account Manipulation

1
T1098

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

File Permissions Modification

1
T1222

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks