General

  • Target

    4e66403a14ee87c5b62f4bfbb511ea97dcb025ff83046396e19a68010a1504c4

  • Size

    331KB

  • Sample

    220720-wbje8sdggq

  • MD5

    6d0e4c5ef82e34b53b10552094a5f274

  • SHA1

    c081c29c5ea4e1dd29d39c533c2fc50edb5a1287

  • SHA256

    4e66403a14ee87c5b62f4bfbb511ea97dcb025ff83046396e19a68010a1504c4

  • SHA512

    cdba1676ca6f79d082602a2ed3111879154f9f2bba8e221e8520bbdc642514915926aac8c4f55832039ba842aef1296aac7293aba6ad4ba5ac95019fcf54af87

Malware Config

Targets

    • Target

      4e66403a14ee87c5b62f4bfbb511ea97dcb025ff83046396e19a68010a1504c4

    • Size

      331KB

    • MD5

      6d0e4c5ef82e34b53b10552094a5f274

    • SHA1

      c081c29c5ea4e1dd29d39c533c2fc50edb5a1287

    • SHA256

      4e66403a14ee87c5b62f4bfbb511ea97dcb025ff83046396e19a68010a1504c4

    • SHA512

      cdba1676ca6f79d082602a2ed3111879154f9f2bba8e221e8520bbdc642514915926aac8c4f55832039ba842aef1296aac7293aba6ad4ba5ac95019fcf54af87

    • Modifies firewall policy service

    • UAC bypass

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks