General

  • Target

    0ff4e71aa98a2ad56e1202a59efcf05c8b5e2c0f98fced5af41cb3410bcf299e

  • Size

    164KB

  • Sample

    221123-xc5kjaef49

  • MD5

    558b96b1644a5c38e1daa67107d06307

  • SHA1

    e8a1324ce6b55f1e0376466c275ef75abbfb2683

  • SHA256

    0ff4e71aa98a2ad56e1202a59efcf05c8b5e2c0f98fced5af41cb3410bcf299e

  • SHA512

    bc3bf44aeae09e6c197f61e2c89ae3390308230ac2c74e1ba3e71bb0ac382bdd6f9724bfcc8e6b1cc077e0a01ea3783292a9ba8fd5df141641502dc1c82657b2

  • SSDEEP

    3072:dGJ1uCEt8tOF5pU+F+X+AWVcupt3hhY1vpUZyzAmf0CSK7nEo69RLwv69dRmqe2v:QJnobn+m+1qB8A4kgqe21Vzn

Malware Config

Targets

    • Target

      0ff4e71aa98a2ad56e1202a59efcf05c8b5e2c0f98fced5af41cb3410bcf299e

    • Size

      164KB

    • MD5

      558b96b1644a5c38e1daa67107d06307

    • SHA1

      e8a1324ce6b55f1e0376466c275ef75abbfb2683

    • SHA256

      0ff4e71aa98a2ad56e1202a59efcf05c8b5e2c0f98fced5af41cb3410bcf299e

    • SHA512

      bc3bf44aeae09e6c197f61e2c89ae3390308230ac2c74e1ba3e71bb0ac382bdd6f9724bfcc8e6b1cc077e0a01ea3783292a9ba8fd5df141641502dc1c82657b2

    • SSDEEP

      3072:dGJ1uCEt8tOF5pU+F+X+AWVcupt3hhY1vpUZyzAmf0CSK7nEo69RLwv69dRmqe2v:QJnobn+m+1qB8A4kgqe21Vzn

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

3
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks