General

  • Target

    free_donate.exe

  • Size

    2.7MB

  • Sample

    221110-xqcfxaegbr

  • MD5

    5026ed09cc5a093093461066d16a8f30

  • SHA1

    34d60b874d9d3f8841c721692ea1daf31f330653

  • SHA256

    b495d68b0733d071e67e0c30665382decd71885af9bad1c6510ef168e5732cd3

  • SHA512

    2429b9d55af9abe991a182b5fe49548d31986046c3bbacaa4021dd7544752f9b2e0b5c494c989b58daafaaf604e863abe3bd013125068331538618140d67a1f1

  • SSDEEP

    49152:HgJH+Kol630+0DW0TOWxKyuPcMPgBAnDEQ1o/40fyNHpElUZ7lPP:AJgl630pBTXVGhPYzQ1o//wElulH

Malware Config

Targets

    • Target

      free_donate.exe

    • Size

      2.7MB

    • MD5

      5026ed09cc5a093093461066d16a8f30

    • SHA1

      34d60b874d9d3f8841c721692ea1daf31f330653

    • SHA256

      b495d68b0733d071e67e0c30665382decd71885af9bad1c6510ef168e5732cd3

    • SHA512

      2429b9d55af9abe991a182b5fe49548d31986046c3bbacaa4021dd7544752f9b2e0b5c494c989b58daafaaf604e863abe3bd013125068331538618140d67a1f1

    • SSDEEP

      49152:HgJH+Kol630+0DW0TOWxKyuPcMPgBAnDEQ1o/40fyNHpElUZ7lPP:AJgl630pBTXVGhPYzQ1o//wElulH

    • Modifies security service

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Sets service image path in registry

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

4
T1112

Impair Defenses

1
T1562

File Permissions Modification

1
T1222

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Impact

Service Stop

1
T1489

Tasks