General

  • Target

    faede41a1d7e8aa73a66594b4dc73c12eebed09ebf6357c265256c7511108d86

  • Size

    96KB

  • Sample

    221124-bj3tmahb52

  • MD5

    363304ba4f3f5e7d80ab0aaa8a69c810

  • SHA1

    5b4117a31f0a4f02115968cd48daf8b30c58cb30

  • SHA256

    faede41a1d7e8aa73a66594b4dc73c12eebed09ebf6357c265256c7511108d86

  • SHA512

    3b60bb180e020ee1140cca244bb7bc5218a0e3eb628ad71916489e04ffe85398971858c397db924dc6dafd6e323e7f604f8ead82ac6253bfdf8ebe2b8a9f62fe

  • SSDEEP

    1536:AG9oK/ilaWQKObheLQQUfJMobxilMqHwVzKekJiX5X0UbiSlsCxf9OI2GVklE09:n/sMl8LEf8HwVdX5FFx1OI2GgEW

Malware Config

Targets

    • Target

      faede41a1d7e8aa73a66594b4dc73c12eebed09ebf6357c265256c7511108d86

    • Size

      96KB

    • MD5

      363304ba4f3f5e7d80ab0aaa8a69c810

    • SHA1

      5b4117a31f0a4f02115968cd48daf8b30c58cb30

    • SHA256

      faede41a1d7e8aa73a66594b4dc73c12eebed09ebf6357c265256c7511108d86

    • SHA512

      3b60bb180e020ee1140cca244bb7bc5218a0e3eb628ad71916489e04ffe85398971858c397db924dc6dafd6e323e7f604f8ead82ac6253bfdf8ebe2b8a9f62fe

    • SSDEEP

      1536:AG9oK/ilaWQKObheLQQUfJMobxilMqHwVzKekJiX5X0UbiSlsCxf9OI2GVklE09:n/sMl8LEf8HwVdX5FFx1OI2GgEW

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

4
T1082

Security Software Discovery

1
T1063

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks