General

  • Target

    a61a3a202f45693bf7e21310198718e952dba27e6430f8c035a58be1f9276120

  • Size

    5.0MB

  • Sample

    221102-ylvblabdc9

  • MD5

    3fc57fd38dd0521976ea9c0f37c187dc

  • SHA1

    f5610c292278e8dd75decdf238dc630f91d204a9

  • SHA256

    a61a3a202f45693bf7e21310198718e952dba27e6430f8c035a58be1f9276120

  • SHA512

    c4b8055d6dca7a969b7096ea7cb04db872bfa3addc0aece41f5fc62c33ae6e1982dfa6e71e0f373456cf89b2f99ff2dee947bb62ba612126c0e86a49146b1300

  • SSDEEP

    98304:EstZLNLdQRhpII22cNb3g2n8zMkd6tSYFxrkDB4n:5ZUhH22cNb3Z8Qkd6tSgJkD

Malware Config

Targets

    • Target

      a61a3a202f45693bf7e21310198718e952dba27e6430f8c035a58be1f9276120

    • Size

      5.0MB

    • MD5

      3fc57fd38dd0521976ea9c0f37c187dc

    • SHA1

      f5610c292278e8dd75decdf238dc630f91d204a9

    • SHA256

      a61a3a202f45693bf7e21310198718e952dba27e6430f8c035a58be1f9276120

    • SHA512

      c4b8055d6dca7a969b7096ea7cb04db872bfa3addc0aece41f5fc62c33ae6e1982dfa6e71e0f373456cf89b2f99ff2dee947bb62ba612126c0e86a49146b1300

    • SSDEEP

      98304:EstZLNLdQRhpII22cNb3g2n8zMkd6tSYFxrkDB4n:5ZUhH22cNb3Z8Qkd6tSgJkD

    • UAC bypass

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks