General

  • Target

    87b7216ea3f4a17978ec2681a586aa75383480bbc007feb21b8346d6e42e5daa

  • Size

    708KB

  • Sample

    221011-le39psgaf8

  • MD5

    13ef998fd07f985613a64da993d7d196

  • SHA1

    ce70ded32a796b46f62ed8a48a9437d1026af161

  • SHA256

    87b7216ea3f4a17978ec2681a586aa75383480bbc007feb21b8346d6e42e5daa

  • SHA512

    218d8aed46a6531c8a711da1cb389dd05b7147385da48f55c706442e59513b55005e652c9113f163967cd0a60e7997fc1b0c0372bd8ab4715af536df9d088e2d

  • SSDEEP

    12288:uTgvmzFHi0mo5aH0qMzd5807FwPJQPDHvd:uTgvOHi0mGaH0qSdPFi4V

Malware Config

Targets

    • Target

      87b7216ea3f4a17978ec2681a586aa75383480bbc007feb21b8346d6e42e5daa

    • Size

      708KB

    • MD5

      13ef998fd07f985613a64da993d7d196

    • SHA1

      ce70ded32a796b46f62ed8a48a9437d1026af161

    • SHA256

      87b7216ea3f4a17978ec2681a586aa75383480bbc007feb21b8346d6e42e5daa

    • SHA512

      218d8aed46a6531c8a711da1cb389dd05b7147385da48f55c706442e59513b55005e652c9113f163967cd0a60e7997fc1b0c0372bd8ab4715af536df9d088e2d

    • SSDEEP

      12288:uTgvmzFHi0mo5aH0qMzd5807FwPJQPDHvd:uTgvOHi0mGaH0qSdPFi4V

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks