General

  • Target

    d58482d9af4f9b69008295ba2684f0b249a699162e44319a74cab4cba3a77266

  • Size

    3.3MB

  • Sample

    220525-bfy19shecl

  • MD5

    29ec167f930bbf8256a66463872ff525

  • SHA1

    4acb67568804342520d71aed66d3d4fc0feac49e

  • SHA256

    d58482d9af4f9b69008295ba2684f0b249a699162e44319a74cab4cba3a77266

  • SHA512

    63c1418dd42618f84d68c3fb74356f97f94b1734ee4e28df63dae1632b8a16eef120017070e824ff496aca11ebade6636f6fa7ef52481a3fba258d9005a3886b

Malware Config

Targets

    • Target

      d58482d9af4f9b69008295ba2684f0b249a699162e44319a74cab4cba3a77266

    • Size

      3.3MB

    • MD5

      29ec167f930bbf8256a66463872ff525

    • SHA1

      4acb67568804342520d71aed66d3d4fc0feac49e

    • SHA256

      d58482d9af4f9b69008295ba2684f0b249a699162e44319a74cab4cba3a77266

    • SHA512

      63c1418dd42618f84d68c3fb74356f97f94b1734ee4e28df63dae1632b8a16eef120017070e824ff496aca11ebade6636f6fa7ef52481a3fba258d9005a3886b

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies file permissions

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

5
T1082

Tasks