General

  • Target

    16bc63f21507429fd3ee692712d98ba9e476db94afec37d26594616afcb60ff3

  • Size

    1.1MB

  • Sample

    221106-lmew3seae7

  • MD5

    32759d20df49c681fb558dde6de8e0b0

  • SHA1

    e8ebb9b090e3a35c8e820dd83ba3d4cdc6560d0f

  • SHA256

    16bc63f21507429fd3ee692712d98ba9e476db94afec37d26594616afcb60ff3

  • SHA512

    deb5d722ad1113a7a13b4cff877d5fb5a8994ab20ee20d37fb9b56bfef8ef32577187e7afe828f39fe5f4e3f4f2d4208a4315de2fe9bd87cc9dda3b3737cbc96

  • SSDEEP

    12288:bF9vvkPCuYcoTKFng0SrQKwypmwPI2A66BvDYqt:jvvkPNjoTKa1UKwykwP+Zrt

Malware Config

Targets

    • Target

      16bc63f21507429fd3ee692712d98ba9e476db94afec37d26594616afcb60ff3

    • Size

      1.1MB

    • MD5

      32759d20df49c681fb558dde6de8e0b0

    • SHA1

      e8ebb9b090e3a35c8e820dd83ba3d4cdc6560d0f

    • SHA256

      16bc63f21507429fd3ee692712d98ba9e476db94afec37d26594616afcb60ff3

    • SHA512

      deb5d722ad1113a7a13b4cff877d5fb5a8994ab20ee20d37fb9b56bfef8ef32577187e7afe828f39fe5f4e3f4f2d4208a4315de2fe9bd87cc9dda3b3737cbc96

    • SSDEEP

      12288:bF9vvkPCuYcoTKFng0SrQKwypmwPI2A66BvDYqt:jvvkPNjoTKa1UKwykwP+Zrt

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks