General

  • Target

    d5803b050f5c49d93f1304781b2081d89fa2e7628105c8ca70ce7112e63e7c41

  • Size

    1016KB

  • Sample

    221019-rs9ljaccam

  • MD5

    a15ddb37241f6e4c6453bf3444da7e80

  • SHA1

    eb5aa2ed8cdf93bdab7f66ecaf36e1ca98ba109a

  • SHA256

    d5803b050f5c49d93f1304781b2081d89fa2e7628105c8ca70ce7112e63e7c41

  • SHA512

    4952e4b2f912446877bd3a330f5c4e7b29a2113ff48b85416e3cf401e341e68f074c44b242a7fb7da251dd61eba03f37f266c87b23382468d37dc297bfb61e3a

  • SSDEEP

    6144:0mIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHU:0mIXsgtvm1De5YlOx6lzBH46U

Malware Config

Targets

    • Target

      d5803b050f5c49d93f1304781b2081d89fa2e7628105c8ca70ce7112e63e7c41

    • Size

      1016KB

    • MD5

      a15ddb37241f6e4c6453bf3444da7e80

    • SHA1

      eb5aa2ed8cdf93bdab7f66ecaf36e1ca98ba109a

    • SHA256

      d5803b050f5c49d93f1304781b2081d89fa2e7628105c8ca70ce7112e63e7c41

    • SHA512

      4952e4b2f912446877bd3a330f5c4e7b29a2113ff48b85416e3cf401e341e68f074c44b242a7fb7da251dd61eba03f37f266c87b23382468d37dc297bfb61e3a

    • SSDEEP

      6144:0mIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHU:0mIXsgtvm1De5YlOx6lzBH46U

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks