General

  • Target

    3e0a6e18934ac4efdaf8a206a03a30715c6452f1ef1fc532b2cfa8006edf0249

  • Size

    496KB

  • Sample

    221011-kw98xafah6

  • MD5

    6e86e0889f0bb8525ff5e1aa5e932150

  • SHA1

    6d7f4772fd1cd73009293d79c94bf74b1b75256a

  • SHA256

    3e0a6e18934ac4efdaf8a206a03a30715c6452f1ef1fc532b2cfa8006edf0249

  • SHA512

    6a606b635ce1f591646929c12125c0b56764b7f196f0cab9ced39724f7c4bc0f0c844a113e1ea112cf9db7fab537542d5faef908e6f92957c048ed3f0a018c64

  • SSDEEP

    12288:kpUJ3r6YkVwJgNnSykgb9cqWnw4q6ZmFhqsc:kpUNr6YkVRFkgbeqeo68FhqR

Malware Config

Targets

    • Target

      3e0a6e18934ac4efdaf8a206a03a30715c6452f1ef1fc532b2cfa8006edf0249

    • Size

      496KB

    • MD5

      6e86e0889f0bb8525ff5e1aa5e932150

    • SHA1

      6d7f4772fd1cd73009293d79c94bf74b1b75256a

    • SHA256

      3e0a6e18934ac4efdaf8a206a03a30715c6452f1ef1fc532b2cfa8006edf0249

    • SHA512

      6a606b635ce1f591646929c12125c0b56764b7f196f0cab9ced39724f7c4bc0f0c844a113e1ea112cf9db7fab537542d5faef908e6f92957c048ed3f0a018c64

    • SSDEEP

      12288:kpUJ3r6YkVwJgNnSykgb9cqWnw4q6ZmFhqsc:kpUNr6YkVRFkgbeqeo68FhqR

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks