General

  • Target

    24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a

  • Size

    715KB

  • Sample

    220521-xhhyqabgd5

  • MD5

    223f0d5a662cd55903180e94f7e1b8f9

  • SHA1

    2496bfa1a88b2096501e3ce4fe3cda590d7a7cd2

  • SHA256

    24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a

  • SHA512

    a20f6f472a1b9bc8878aee80a36f33990cc574cf32a025373d99c9b6eb22a89af80c6b60211d08accbc7643bbd60abfbd551e144acb0c0c9e29fe26be695843d

Malware Config

Targets

    • Target

      24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a

    • Size

      715KB

    • MD5

      223f0d5a662cd55903180e94f7e1b8f9

    • SHA1

      2496bfa1a88b2096501e3ce4fe3cda590d7a7cd2

    • SHA256

      24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a

    • SHA512

      a20f6f472a1b9bc8878aee80a36f33990cc574cf32a025373d99c9b6eb22a89af80c6b60211d08accbc7643bbd60abfbd551e144acb0c0c9e29fe26be695843d

    • UAC bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Program crash

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks