General

  • Target

    3b0887cfe4ce4b9b772d29dc266b2a7a246c73bcf5ba2fae0cdf13765ffb26c2

  • Size

    1016KB

  • Sample

    221012-swkbgshdb2

  • MD5

    50f579615bcd1ee972672ac39fc6b7a0

  • SHA1

    f5b92967ba292cc96e17ed837b11ffe6756fbb78

  • SHA256

    3b0887cfe4ce4b9b772d29dc266b2a7a246c73bcf5ba2fae0cdf13765ffb26c2

  • SHA512

    8d1e8368b661578449270d583b3ee60deaae3b83a892778398e0cb30a85148681eea23c772432a595c8562ac9fc7204498eadd224766ebf53fe4db5b5fecd6fc

  • SSDEEP

    6144:XEIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHUmkjP:XEIXsgtvm1De5YlOx6lzBH46U

Malware Config

Targets

    • Target

      3b0887cfe4ce4b9b772d29dc266b2a7a246c73bcf5ba2fae0cdf13765ffb26c2

    • Size

      1016KB

    • MD5

      50f579615bcd1ee972672ac39fc6b7a0

    • SHA1

      f5b92967ba292cc96e17ed837b11ffe6756fbb78

    • SHA256

      3b0887cfe4ce4b9b772d29dc266b2a7a246c73bcf5ba2fae0cdf13765ffb26c2

    • SHA512

      8d1e8368b661578449270d583b3ee60deaae3b83a892778398e0cb30a85148681eea23c772432a595c8562ac9fc7204498eadd224766ebf53fe4db5b5fecd6fc

    • SSDEEP

      6144:XEIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHUmkjP:XEIXsgtvm1De5YlOx6lzBH46U

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks