General

  • Target

    f524f1b36c0977f36c15a0d4f7a7b1a78d73c667c419c0d8f6ea8f5d35cb040b

  • Size

    389KB

  • Sample

    221003-aq8g1sadbj

  • MD5

    44be29f905e5808121245b05ce13c970

  • SHA1

    044875808fb93953dc25e8a2998cb3a33d0522a3

  • SHA256

    f524f1b36c0977f36c15a0d4f7a7b1a78d73c667c419c0d8f6ea8f5d35cb040b

  • SHA512

    0415f486023c6c63f3ca04a097df8a9577106a4fbbc3590de223511b8d7e5a7313b56e32b6e9cf95417c597ffeaef549fe8578173db6046b8d05b1ec7f7d5508

  • SSDEEP

    3072:VTlmPVcdgJs8HjfYv27XaaHw7Koj4rt032QdMTPmb3HwInv4JMke9PkvDnM8ua7:VTMPVcdgnDfYe7G2QdDb3Uh7

Malware Config

Targets

    • Target

      f524f1b36c0977f36c15a0d4f7a7b1a78d73c667c419c0d8f6ea8f5d35cb040b

    • Size

      389KB

    • MD5

      44be29f905e5808121245b05ce13c970

    • SHA1

      044875808fb93953dc25e8a2998cb3a33d0522a3

    • SHA256

      f524f1b36c0977f36c15a0d4f7a7b1a78d73c667c419c0d8f6ea8f5d35cb040b

    • SHA512

      0415f486023c6c63f3ca04a097df8a9577106a4fbbc3590de223511b8d7e5a7313b56e32b6e9cf95417c597ffeaef549fe8578173db6046b8d05b1ec7f7d5508

    • SSDEEP

      3072:VTlmPVcdgJs8HjfYv27XaaHw7Koj4rt032QdMTPmb3HwInv4JMke9PkvDnM8ua7:VTMPVcdgnDfYe7G2QdDb3Uh7

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks