General

  • Target

    9128977b7210bfa829c23f8a1719b00fac2b1bbc8c5e2cb47ae23c51500f0b40

  • Size

    1016KB

  • Sample

    221123-xb3dsaee69

  • MD5

    57b396a2e8cf5f0df966da0db3b7d1b0

  • SHA1

    ba2a472114c0a1fdf34413d8d9ec73347bccc693

  • SHA256

    9128977b7210bfa829c23f8a1719b00fac2b1bbc8c5e2cb47ae23c51500f0b40

  • SHA512

    87ddbd3accb40635ba6f3a5dd2f16bec58152ec70930e03031aedb42dc892581fa05b4a0f788302a1e3d05c237b18f8a4bd6ec94a4e1a84c9a058cba8f72c1af

  • SSDEEP

    6144:jIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHUmDa1is0f:jIXsgtvm1De5YlOx6lzBH46Umu1q

Malware Config

Targets

    • Target

      9128977b7210bfa829c23f8a1719b00fac2b1bbc8c5e2cb47ae23c51500f0b40

    • Size

      1016KB

    • MD5

      57b396a2e8cf5f0df966da0db3b7d1b0

    • SHA1

      ba2a472114c0a1fdf34413d8d9ec73347bccc693

    • SHA256

      9128977b7210bfa829c23f8a1719b00fac2b1bbc8c5e2cb47ae23c51500f0b40

    • SHA512

      87ddbd3accb40635ba6f3a5dd2f16bec58152ec70930e03031aedb42dc892581fa05b4a0f788302a1e3d05c237b18f8a4bd6ec94a4e1a84c9a058cba8f72c1af

    • SSDEEP

      6144:jIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHUmDa1is0f:jIXsgtvm1De5YlOx6lzBH46Umu1q

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks