General

  • Target

    254c0a17d689a084b0b515bd9786c26867b98a512ebf0b7b8604f474e5a4d497

  • Size

    692KB

  • Sample

    221020-k3mfesehf2

  • MD5

    80fa45275e51e52ca290e9d7bdfb3227

  • SHA1

    ff399db342e6a6e247a1c1da250d3da835e30d0c

  • SHA256

    254c0a17d689a084b0b515bd9786c26867b98a512ebf0b7b8604f474e5a4d497

  • SHA512

    a73dd51e35bd403a91bedacf2b8a0a9783723e9249e6f33fc86ec41a61347ad058e169ec9e6d2d2cff55156c61b7e20ccc024a5d9b03d982f6066353fefbaca9

  • SSDEEP

    12288:5Nw+625NVQCU9LQm/+JL9xu8qMKjD18s2OjL+HZTYCzeSgG+eQQeWTdQcF:Q+pXVQem/+7xbqZ8cjLMbDgGfeWT+c

Malware Config

Targets

    • Target

      254c0a17d689a084b0b515bd9786c26867b98a512ebf0b7b8604f474e5a4d497

    • Size

      692KB

    • MD5

      80fa45275e51e52ca290e9d7bdfb3227

    • SHA1

      ff399db342e6a6e247a1c1da250d3da835e30d0c

    • SHA256

      254c0a17d689a084b0b515bd9786c26867b98a512ebf0b7b8604f474e5a4d497

    • SHA512

      a73dd51e35bd403a91bedacf2b8a0a9783723e9249e6f33fc86ec41a61347ad058e169ec9e6d2d2cff55156c61b7e20ccc024a5d9b03d982f6066353fefbaca9

    • SSDEEP

      12288:5Nw+625NVQCU9LQm/+JL9xu8qMKjD18s2OjL+HZTYCzeSgG+eQQeWTdQcF:Q+pXVQem/+7xbqZ8cjLMbDgGfeWT+c

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks