General

  • Target

    5727b9e4ef983311c263bc77fd1a545f8860d25138d737ff4128f11f85ab793b

  • Size

    6.4MB

  • Sample

    220725-awfzysffan

  • MD5

    8aeba47c52536a3cc2e5ff20954477ae

  • SHA1

    6971ff714dd3185fc684853b8dffc83935ad027a

  • SHA256

    5727b9e4ef983311c263bc77fd1a545f8860d25138d737ff4128f11f85ab793b

  • SHA512

    e85b57065e39fb5e7d95f87ac4b2c4b38214fbc4f2b42001281090e19acbaa14277cd8cf937c02b1697840065768795d270624fbd99e4a49a7f0192119bd4cf4

Malware Config

Targets

    • Target

      5727b9e4ef983311c263bc77fd1a545f8860d25138d737ff4128f11f85ab793b

    • Size

      6.4MB

    • MD5

      8aeba47c52536a3cc2e5ff20954477ae

    • SHA1

      6971ff714dd3185fc684853b8dffc83935ad027a

    • SHA256

      5727b9e4ef983311c263bc77fd1a545f8860d25138d737ff4128f11f85ab793b

    • SHA512

      e85b57065e39fb5e7d95f87ac4b2c4b38214fbc4f2b42001281090e19acbaa14277cd8cf937c02b1697840065768795d270624fbd99e4a49a7f0192119bd4cf4

    • suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016 (WinHTTPRequest)

      suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016 (WinHTTPRequest)

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Security Software Discovery

1
T1063

Tasks