General

  • Target

    791ab6e7a3087b1137cc26fca64b8101ed1400f879ef55a2bafa95252567d41c

  • Size

    205KB

  • Sample

    221123-mq7lyaeg67

  • MD5

    4df6acbba6c22338c62f87efef265647

  • SHA1

    fd0cc57766fed773ac1cea5c5e8c0f090a927817

  • SHA256

    791ab6e7a3087b1137cc26fca64b8101ed1400f879ef55a2bafa95252567d41c

  • SHA512

    f84e04c79e36f42a46ac2d9cb50ed0834852155c6a9e514f4fcf3a3bf9bc7fd74ef1a255075e5d81ed208d4f947ddd014feaf84d49281fbf785159fe159426b2

  • SSDEEP

    3072:yqhMPktRhlARSOsdwD/98out3SDADeak7dJHB/AKG:yqhMPktRARoiSoS3SsQLH5AK

Malware Config

Targets

    • Target

      791ab6e7a3087b1137cc26fca64b8101ed1400f879ef55a2bafa95252567d41c

    • Size

      205KB

    • MD5

      4df6acbba6c22338c62f87efef265647

    • SHA1

      fd0cc57766fed773ac1cea5c5e8c0f090a927817

    • SHA256

      791ab6e7a3087b1137cc26fca64b8101ed1400f879ef55a2bafa95252567d41c

    • SHA512

      f84e04c79e36f42a46ac2d9cb50ed0834852155c6a9e514f4fcf3a3bf9bc7fd74ef1a255075e5d81ed208d4f947ddd014feaf84d49281fbf785159fe159426b2

    • SSDEEP

      3072:yqhMPktRhlARSOsdwD/98out3SDADeak7dJHB/AKG:yqhMPktRARoiSoS3SsQLH5AK

    • Modifies WinLogon for persistence

    • Modifies system executable filetype association

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Blocklisted process makes network request

    • Disables RegEdit via registry modification

    • Disables use of System Restore points

    • Executes dropped EXE

    • Sets file execution options in registry

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks