General

  • Target

    16823d06e4fa5f54618475d675ff8bfe434b1b89b344a41a81b2d3edc0bbc2e5

  • Size

    1.5MB

  • Sample

    220630-wc6bdseehp

  • MD5

    000f1831732413a98b9f38ce657dab21

  • SHA1

    0375a5e61afe2e1a9b2f9a1812ed5a15f1e1df06

  • SHA256

    16823d06e4fa5f54618475d675ff8bfe434b1b89b344a41a81b2d3edc0bbc2e5

  • SHA512

    22be98db2ba49aa8b202dd3bf9c142c5a710c57f15382128e99fff4b62f8e2cbc7a09b25945ce44cb7b401e0c56a54542b26ccd121a6724e4035fbd4ececc93e

Malware Config

Targets

    • Target

      16823d06e4fa5f54618475d675ff8bfe434b1b89b344a41a81b2d3edc0bbc2e5

    • Size

      1.5MB

    • MD5

      000f1831732413a98b9f38ce657dab21

    • SHA1

      0375a5e61afe2e1a9b2f9a1812ed5a15f1e1df06

    • SHA256

      16823d06e4fa5f54618475d675ff8bfe434b1b89b344a41a81b2d3edc0bbc2e5

    • SHA512

      22be98db2ba49aa8b202dd3bf9c142c5a710c57f15382128e99fff4b62f8e2cbc7a09b25945ce44cb7b401e0c56a54542b26ccd121a6724e4035fbd4ececc93e

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • Turns off Windows Defender SpyNet reporting

    • Windows security bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Windows security modification

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

7
T1112

Disabling Security Tools

4
T1089

Virtualization/Sandbox Evasion

2
T1497

Install Root Certificate

1
T1130

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Command and Control

Web Service

1
T1102

Tasks