General

  • Target

    b69ae4a13dff3e76060d9bfa66bb838d0881e5a79b82ec5bf647d6256415b92a

  • Size

    96KB

  • Sample

    221124-bf3dpagh83

  • MD5

    347fafe56ef50d6edb9f81d47dc40731

  • SHA1

    3c66549b28ae60c4028e0833efdde00303f54511

  • SHA256

    b69ae4a13dff3e76060d9bfa66bb838d0881e5a79b82ec5bf647d6256415b92a

  • SHA512

    5e8ae51ee81d911d1f2902552fab9f34f13d0d8f699312be3bea84a12e621c41c8ed477929596de1112c30f7d7ace2d97241bcf8db509122e60030f3c049c0b9

  • SSDEEP

    1536:O9wvQUreUbyzsB+2zeNOpQxgbZdCNlv4wsaec7ht0LGa8:SA/yzn2ze8pnbZd0v33/h6

Score
10/10

Malware Config

Targets

    • Target

      b69ae4a13dff3e76060d9bfa66bb838d0881e5a79b82ec5bf647d6256415b92a

    • Size

      96KB

    • MD5

      347fafe56ef50d6edb9f81d47dc40731

    • SHA1

      3c66549b28ae60c4028e0833efdde00303f54511

    • SHA256

      b69ae4a13dff3e76060d9bfa66bb838d0881e5a79b82ec5bf647d6256415b92a

    • SHA512

      5e8ae51ee81d911d1f2902552fab9f34f13d0d8f699312be3bea84a12e621c41c8ed477929596de1112c30f7d7ace2d97241bcf8db509122e60030f3c049c0b9

    • SSDEEP

      1536:O9wvQUreUbyzsB+2zeNOpQxgbZdCNlv4wsaec7ht0LGa8:SA/yzn2ze8pnbZd0v33/h6

    Score
    10/10
    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Hidden Files and Directories

4
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

4
T1158

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks