General

  • Target

    b4253f3ea96808cba77b8ceb0f76d1d4.exe

  • Size

    1.2MB

  • Sample

    220525-se1xxabeb8

  • MD5

    b4253f3ea96808cba77b8ceb0f76d1d4

  • SHA1

    d4b776ae1c0fa40c532a812dd69cd199e1fef94e

  • SHA256

    ff536d51ab667c0546c33352c460bbceb6722d333932ba992364b032cba6af1e

  • SHA512

    bceebeb1435b0858b9462ad42fdab065c81f90db8f8ea19c6d08d14574720ec71a260b6675180362db9639d5707b0a11c7b6027d7c8e1055ba06a30c7cfb0c90

Malware Config

Targets

    • Target

      b4253f3ea96808cba77b8ceb0f76d1d4.exe

    • Size

      1.2MB

    • MD5

      b4253f3ea96808cba77b8ceb0f76d1d4

    • SHA1

      d4b776ae1c0fa40c532a812dd69cd199e1fef94e

    • SHA256

      ff536d51ab667c0546c33352c460bbceb6722d333932ba992364b032cba6af1e

    • SHA512

      bceebeb1435b0858b9462ad42fdab065c81f90db8f8ea19c6d08d14574720ec71a260b6675180362db9639d5707b0a11c7b6027d7c8e1055ba06a30c7cfb0c90

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UAC bypass

    • suricata: ET MALWARE Arechclient2 Backdoor CnC Init

      suricata: ET MALWARE Arechclient2 Backdoor CnC Init

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Tasks