General

  • Target

    KILLER.vbs

  • Size

    47KB

  • Sample

    221102-qext5sbfdj

  • MD5

    a0c297bdf8292acd6722a3ea07611083

  • SHA1

    b2eb77063193f1566fe8898086b2c6f286c52d4b

  • SHA256

    f8a5ffdc8bdb7590517a0418b6468dc1e0ee58a8573d87d8ab9c0aef71b598cc

  • SHA512

    9ffd27e9acf261f7f8aeb3a98a89257e4cb5c8dc78aca7d64762f1d895230fc1248c7b1333816fa7ca823eb4c8c9d4b01c2a1db71f66a792837d155557c45900

  • SSDEEP

    384:m71TIEgivcqpCghtpCAhDnVLri57VurlgRL1xCLI05ej+1DPpUo/i/vFCbWZkraw:m7cGV95hIG1/d49gsCDs8

Malware Config

Targets

    • Target

      KILLER.vbs

    • Size

      47KB

    • MD5

      a0c297bdf8292acd6722a3ea07611083

    • SHA1

      b2eb77063193f1566fe8898086b2c6f286c52d4b

    • SHA256

      f8a5ffdc8bdb7590517a0418b6468dc1e0ee58a8573d87d8ab9c0aef71b598cc

    • SHA512

      9ffd27e9acf261f7f8aeb3a98a89257e4cb5c8dc78aca7d64762f1d895230fc1248c7b1333816fa7ca823eb4c8c9d4b01c2a1db71f66a792837d155557c45900

    • SSDEEP

      384:m71TIEgivcqpCghtpCAhDnVLri57VurlgRL1xCLI05ej+1DPpUo/i/vFCbWZkraw:m7cGV95hIG1/d49gsCDs8

    • UAC bypass

    • Blocklisted process makes network request

    • Disables cmd.exe use via registry modification

    • Modifies Installed Components in the registry

    • Possible privilege escalation attempt

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Modifies file permissions

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks