Resubmissions

02-09-2022 20:06

220902-yvgf4abefr 10

02-09-2022 20:04

220902-ytk3wseca6 10

02-09-2022 20:03

220902-ys52nsbedn 10

02-09-2022 19:55

220902-ynenxseba3 10

02-09-2022 19:49

220902-yj5pjseac3 10

02-09-2022 18:42

220902-xclsesdbc6 10

General

  • Target

    http://81.161.229.110/htdocs/

  • Sample

    220902-yvgf4abefr

Malware Config

Targets

    • Target

      http://81.161.229.110/htdocs/

    • Modifies security service

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Modifies file permissions

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Defense Evasion

Modify Registry

4
T1112

Impair Defenses

1
T1562

File Permissions Modification

1
T1222

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Impact

Service Stop

1
T1489

Tasks