General

  • Target

    c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b

  • Size

    456KB

  • Sample

    221002-jvm7bagacl

  • MD5

    7143265016682a10442c7455007dd922

  • SHA1

    cf412f69d2afdc4c04c128eda90eca7e45c7cc71

  • SHA256

    c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b

  • SHA512

    c468b8a622d69ecd3d455d5a376412583ff3d8296140b8434f9f3d5cb24161dc1467df8b4e290eb3023327ea1ad869e39e085d6e20587d4079b2e161a30818fc

  • SSDEEP

    12288:jEVXKpmokXif4JgTIoq43H2cE05nMx11DGkfb7i:jEtR/iAJgMe3H2cJCx1YOb7i

Malware Config

Targets

    • Target

      c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b

    • Size

      456KB

    • MD5

      7143265016682a10442c7455007dd922

    • SHA1

      cf412f69d2afdc4c04c128eda90eca7e45c7cc71

    • SHA256

      c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b

    • SHA512

      c468b8a622d69ecd3d455d5a376412583ff3d8296140b8434f9f3d5cb24161dc1467df8b4e290eb3023327ea1ad869e39e085d6e20587d4079b2e161a30818fc

    • SSDEEP

      12288:jEVXKpmokXif4JgTIoq43H2cE05nMx11DGkfb7i:jEtR/iAJgMe3H2cJCx1YOb7i

    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks