General

  • Target

    abe288a06abeb3bc46a7ceafc8e09968ef797bdcb085a33160f326fd87deb300

  • Size

    29KB

  • Sample

    221124-e189hscb91

  • MD5

    8fa4e045a294fe8b9bcc97b35cfb3606

  • SHA1

    7d477efba9c42c4d16d66c0ec7c8e4204bc857c2

  • SHA256

    abe288a06abeb3bc46a7ceafc8e09968ef797bdcb085a33160f326fd87deb300

  • SHA512

    26777098b6458e675f56066dfcb5da5d7b8f123a764d61e8e05dcb867c41cc60e4abff459d9f8a2c2255678b55f8c433cc862bee7ee216cfa8f58b59fda1b8c4

  • SSDEEP

    384:3vtZGErVRAdw/NKRZJbwwpQVTdIGyctItwqXIcLc5IxmyO5ZEzbasZPzVobwJTI5:3lyw2bbpdGyctstBaiLFhJTu7

Malware Config

Targets

    • Target

      abe288a06abeb3bc46a7ceafc8e09968ef797bdcb085a33160f326fd87deb300

    • Size

      29KB

    • MD5

      8fa4e045a294fe8b9bcc97b35cfb3606

    • SHA1

      7d477efba9c42c4d16d66c0ec7c8e4204bc857c2

    • SHA256

      abe288a06abeb3bc46a7ceafc8e09968ef797bdcb085a33160f326fd87deb300

    • SHA512

      26777098b6458e675f56066dfcb5da5d7b8f123a764d61e8e05dcb867c41cc60e4abff459d9f8a2c2255678b55f8c433cc862bee7ee216cfa8f58b59fda1b8c4

    • SSDEEP

      384:3vtZGErVRAdw/NKRZJbwwpQVTdIGyctItwqXIcLc5IxmyO5ZEzbasZPzVobwJTI5:3lyw2bbpdGyctstBaiLFhJTu7

    • UAC bypass

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks