General

  • Target

    2e7db82a3288801c08b522a4c0cbdbb98e8f8d6d190f4893fa690c101bb8e50b

  • Size

    2.9MB

  • Sample

    220521-ngbnksgggk

  • MD5

    83fc8751c4371726a668dc900931eefb

  • SHA1

    e98102d10868febffe0743c0c5ed51356ccb666c

  • SHA256

    2e7db82a3288801c08b522a4c0cbdbb98e8f8d6d190f4893fa690c101bb8e50b

  • SHA512

    9b9ffa9fba53e4c25b9eba9b0ec41f75265975f6b95d77ea0fc7a4bd9b808d9f6c067566cb2f6482912ac867a600a8e00ca3aedaa707b26f0193eed3699f835d

Malware Config

Targets

    • Target

      2e7db82a3288801c08b522a4c0cbdbb98e8f8d6d190f4893fa690c101bb8e50b

    • Size

      2.9MB

    • MD5

      83fc8751c4371726a668dc900931eefb

    • SHA1

      e98102d10868febffe0743c0c5ed51356ccb666c

    • SHA256

      2e7db82a3288801c08b522a4c0cbdbb98e8f8d6d190f4893fa690c101bb8e50b

    • SHA512

      9b9ffa9fba53e4c25b9eba9b0ec41f75265975f6b95d77ea0fc7a4bd9b808d9f6c067566cb2f6482912ac867a600a8e00ca3aedaa707b26f0193eed3699f835d

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks