General

  • Target

    8548fbd28728ccded1cf33d0f31835111471716ce9dcb77af926a56e59924aaf

  • Size

    272KB

  • Sample

    221124-bj5m8ahb55

  • MD5

    15baf936ad283c5b3075acca81b2d8c0

  • SHA1

    ac2a303b5206d85049e05546e7917a8b62c66d75

  • SHA256

    8548fbd28728ccded1cf33d0f31835111471716ce9dcb77af926a56e59924aaf

  • SHA512

    96f7aed1fa623d60ae1d5191b6d3810aa6ba8dc789ea79ee3d72a6a2ecfddaf633e6b6703125fffe5d63dcd95328e9496c240385e2470c2041187396699227ae

  • SSDEEP

    6144:KD3vjxbG3rR1qxwzcP2vrcff/KBAOROq952w:KD9bG3rexwz5vrcffiBTB52w

Malware Config

Targets

    • Target

      8548fbd28728ccded1cf33d0f31835111471716ce9dcb77af926a56e59924aaf

    • Size

      272KB

    • MD5

      15baf936ad283c5b3075acca81b2d8c0

    • SHA1

      ac2a303b5206d85049e05546e7917a8b62c66d75

    • SHA256

      8548fbd28728ccded1cf33d0f31835111471716ce9dcb77af926a56e59924aaf

    • SHA512

      96f7aed1fa623d60ae1d5191b6d3810aa6ba8dc789ea79ee3d72a6a2ecfddaf633e6b6703125fffe5d63dcd95328e9496c240385e2470c2041187396699227ae

    • SSDEEP

      6144:KD3vjxbG3rR1qxwzcP2vrcff/KBAOROq952w:KD9bG3rexwz5vrcffiBTB52w

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

4
T1082

Security Software Discovery

1
T1063

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks