General

  • Target

    0b3ace1ae9feabb2cd3c349f629d6aa06cbf4cde1e49806fbdcef5d4ce92cd87

  • Size

    774KB

  • Sample

    221002-rlzsraacf3

  • MD5

    655506c103f2eccc4ba7a082eb4a58bb

  • SHA1

    9b889330cd9d647bd15452645ed61365feeb8e80

  • SHA256

    0b3ace1ae9feabb2cd3c349f629d6aa06cbf4cde1e49806fbdcef5d4ce92cd87

  • SHA512

    746cf2ff66f852227d518a5114533a17906002a48ed90f3cc6f9db06e52530c6c4f1af69241a69a221c68c996aef431678bb100248d9f4a721a5dcb4012bb8ed

Malware Config

Targets

    • Target

      0b3ace1ae9feabb2cd3c349f629d6aa06cbf4cde1e49806fbdcef5d4ce92cd87

    • Size

      774KB

    • MD5

      655506c103f2eccc4ba7a082eb4a58bb

    • SHA1

      9b889330cd9d647bd15452645ed61365feeb8e80

    • SHA256

      0b3ace1ae9feabb2cd3c349f629d6aa06cbf4cde1e49806fbdcef5d4ce92cd87

    • SHA512

      746cf2ff66f852227d518a5114533a17906002a48ed90f3cc6f9db06e52530c6c4f1af69241a69a221c68c996aef431678bb100248d9f4a721a5dcb4012bb8ed

    • Loads dropped DLL

    • Adds Run key to start application

    • Detected potential entity reuse from brand microsoft.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

        Execution

          Exfiltration

            Impact

              Initial Access

                Lateral Movement

                  Privilege Escalation