General

  • Target

    7aeee031d10561d531f03e64874fbe01dddca7f175b2e6a4c19f039c01348c71

  • Size

    648KB

  • Sample

    221004-dnw8raacg8

  • MD5

    68499d93e5ff4d1e8bd7b14ce3b55add

  • SHA1

    8eb09e8c065d5d489024601650494d806f76a454

  • SHA256

    7aeee031d10561d531f03e64874fbe01dddca7f175b2e6a4c19f039c01348c71

  • SHA512

    4d9131886e9d72c6ccc104f8f2a2480ac1d9ccd25b62d0c0f2d01897d2426582793e4e90668d3be5ec83f705844a413ea6cd00ae5b551bda843adb4ac0dc3f51

  • SSDEEP

    12288:IpUJ3r6YkVwJgNnSykgb9cqWnw4q6ZmFhqss:IpUNr6YkVRFkgbeqeo68Fhq

Malware Config

Targets

    • Target

      7aeee031d10561d531f03e64874fbe01dddca7f175b2e6a4c19f039c01348c71

    • Size

      648KB

    • MD5

      68499d93e5ff4d1e8bd7b14ce3b55add

    • SHA1

      8eb09e8c065d5d489024601650494d806f76a454

    • SHA256

      7aeee031d10561d531f03e64874fbe01dddca7f175b2e6a4c19f039c01348c71

    • SHA512

      4d9131886e9d72c6ccc104f8f2a2480ac1d9ccd25b62d0c0f2d01897d2426582793e4e90668d3be5ec83f705844a413ea6cd00ae5b551bda843adb4ac0dc3f51

    • SSDEEP

      12288:IpUJ3r6YkVwJgNnSykgb9cqWnw4q6ZmFhqss:IpUNr6YkVRFkgbeqeo68Fhq

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks