General

  • Target

    57bb9b7ac65558b318929cb1b2e9dd40ed8d0dc9a5793605059b7a4bce17fcbc

  • Size

    68KB

  • Sample

    221011-rmdlxahea4

  • MD5

    47938fc743d6df2b37b085d5eb1ef3d5

  • SHA1

    b741c393f0ea66c78ec0af99957089ab5a030f22

  • SHA256

    57bb9b7ac65558b318929cb1b2e9dd40ed8d0dc9a5793605059b7a4bce17fcbc

  • SHA512

    062ab856373fff064bf3f981d4ec21119c8f2965357aafce342a64ba912e91bdffd2e630b6bb8112643dfa9c3991c35e286a88585da97b6ad86810f70eab3762

  • SSDEEP

    1536:lIB5gI07vjhmrhxPhJgtwUjyDy9GjpT2+v4lPhg4tBzi3WtTuCnouy8:Mmnbh0zJkjyDJiLdbO3WTout

Malware Config

Targets

    • Target

      57bb9b7ac65558b318929cb1b2e9dd40ed8d0dc9a5793605059b7a4bce17fcbc

    • Size

      68KB

    • MD5

      47938fc743d6df2b37b085d5eb1ef3d5

    • SHA1

      b741c393f0ea66c78ec0af99957089ab5a030f22

    • SHA256

      57bb9b7ac65558b318929cb1b2e9dd40ed8d0dc9a5793605059b7a4bce17fcbc

    • SHA512

      062ab856373fff064bf3f981d4ec21119c8f2965357aafce342a64ba912e91bdffd2e630b6bb8112643dfa9c3991c35e286a88585da97b6ad86810f70eab3762

    • SSDEEP

      1536:lIB5gI07vjhmrhxPhJgtwUjyDy9GjpT2+v4lPhg4tBzi3WtTuCnouy8:Mmnbh0zJkjyDJiLdbO3WTout

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks