General

  • Target

    3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6

  • Size

    3.0MB

  • Sample

    220703-lt84haebhm

  • MD5

    df759879f60a7276ff8911c366cbb8a5

  • SHA1

    26fa79f21bc021128e91e5142f6a17c07e750251

  • SHA256

    3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6

  • SHA512

    57c5780ba66d73f15f13a227dd012fef2b1c921d6d79e2bf8a14a0b0b9581a4854c82434be779f4d9fee32729d80b0a75f1907b5e08cf11c6499b7040b8387db

Malware Config

Targets

    • Target

      3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6

    • Size

      3.0MB

    • MD5

      df759879f60a7276ff8911c366cbb8a5

    • SHA1

      26fa79f21bc021128e91e5142f6a17c07e750251

    • SHA256

      3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6

    • SHA512

      57c5780ba66d73f15f13a227dd012fef2b1c921d6d79e2bf8a14a0b0b9581a4854c82434be779f4d9fee32729d80b0a75f1907b5e08cf11c6499b7040b8387db

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks