General

  • Target

    45b74a50c20e74c1b41f3f35d10725971d74fcdaf077c06cbe51f2784e741315

  • Size

    25.1MB

  • Sample

    221103-3baawsgfc9

  • MD5

    b4775fcffd1877ffa155fffc0832cbd8

  • SHA1

    c1e419c89fbd9aadcd1d436ec2c98f3be1db8dad

  • SHA256

    45b74a50c20e74c1b41f3f35d10725971d74fcdaf077c06cbe51f2784e741315

  • SHA512

    6c697f8df1d5e3395b3caa8bc89c1e74706c23cef21cbf7abb62efaebeb02c09228e4079d62a7e65f56a6232f9b85ba9fb1e174772313a574e03d91df3b4e8e0

  • SSDEEP

    786432:d3GJ4ZidZLnUH8ANG3Yjonnb1f5VgXoPq:cqyLnKFgbx5VgYPq

Malware Config

Targets

    • Target

      45b74a50c20e74c1b41f3f35d10725971d74fcdaf077c06cbe51f2784e741315

    • Size

      25.1MB

    • MD5

      b4775fcffd1877ffa155fffc0832cbd8

    • SHA1

      c1e419c89fbd9aadcd1d436ec2c98f3be1db8dad

    • SHA256

      45b74a50c20e74c1b41f3f35d10725971d74fcdaf077c06cbe51f2784e741315

    • SHA512

      6c697f8df1d5e3395b3caa8bc89c1e74706c23cef21cbf7abb62efaebeb02c09228e4079d62a7e65f56a6232f9b85ba9fb1e174772313a574e03d91df3b4e8e0

    • SSDEEP

      786432:d3GJ4ZidZLnUH8ANG3Yjonnb1f5VgXoPq:cqyLnKFgbx5VgYPq

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Registers COM server for autorun

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Modify Existing Service

1
T1031

Hidden Files and Directories

1
T1158

Defense Evasion

Impair Defenses

1
T1562

File Permissions Modification

1
T1222

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Impact

Service Stop

1
T1489

Tasks