General

  • Target

    0b5c130d1ce45f2c4498516f52e1bbe30dc71cff31869e545997c6f95b7ac9df

  • Size

    1016KB

  • Sample

    221002-j2nresfaa3

  • MD5

    6ef88b4abcaf2f29904c91ae37631fc0

  • SHA1

    e49adbe4a8fa2bb7ba5889a11bc9c598b26b05bf

  • SHA256

    0b5c130d1ce45f2c4498516f52e1bbe30dc71cff31869e545997c6f95b7ac9df

  • SHA512

    996c6364ba0a3d27ab8c3b03c6a0501d47009e16accfd70406c9b517535e7998801dc77e6aaada1145a304937f5aebef0563f0f996a78af6228f445d15011b7c

  • SSDEEP

    6144:JIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHUmDa1is0f:JIXsgtvm1De5YlOx6lzBH46Umu1q

Malware Config

Targets

    • Target

      0b5c130d1ce45f2c4498516f52e1bbe30dc71cff31869e545997c6f95b7ac9df

    • Size

      1016KB

    • MD5

      6ef88b4abcaf2f29904c91ae37631fc0

    • SHA1

      e49adbe4a8fa2bb7ba5889a11bc9c598b26b05bf

    • SHA256

      0b5c130d1ce45f2c4498516f52e1bbe30dc71cff31869e545997c6f95b7ac9df

    • SHA512

      996c6364ba0a3d27ab8c3b03c6a0501d47009e16accfd70406c9b517535e7998801dc77e6aaada1145a304937f5aebef0563f0f996a78af6228f445d15011b7c

    • SSDEEP

      6144:JIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHUmDa1is0f:JIXsgtvm1De5YlOx6lzBH46Umu1q

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks