General

  • Target

    736f20990a13756c950e6b13c4b3a3d10a2d6ab79b33293f73ada6370f98c6e9

  • Size

    447KB

  • Sample

    221124-gj25zsfg5v

  • MD5

    516b74efab1c545aa46110a743e496a6

  • SHA1

    39d8600ccd9eb6efd9626538791d8addc335ea4f

  • SHA256

    736f20990a13756c950e6b13c4b3a3d10a2d6ab79b33293f73ada6370f98c6e9

  • SHA512

    d6d267db40a5aaa25b931d337d32a707d4ac391ad6dc241f2394b93819d8c9a52bc0858681ecd4974a99ee9bca714ec6ac0e448e20b6eb8eeb237d377a377d71

  • SSDEEP

    12288:JHICZ9iSCnm8B/Hw9pVKGCs64DVdZ3+8qFXTjT+:JoC7ijwFKlVadZ3+8qNC

Malware Config

Targets

    • Target

      736f20990a13756c950e6b13c4b3a3d10a2d6ab79b33293f73ada6370f98c6e9

    • Size

      447KB

    • MD5

      516b74efab1c545aa46110a743e496a6

    • SHA1

      39d8600ccd9eb6efd9626538791d8addc335ea4f

    • SHA256

      736f20990a13756c950e6b13c4b3a3d10a2d6ab79b33293f73ada6370f98c6e9

    • SHA512

      d6d267db40a5aaa25b931d337d32a707d4ac391ad6dc241f2394b93819d8c9a52bc0858681ecd4974a99ee9bca714ec6ac0e448e20b6eb8eeb237d377a377d71

    • SSDEEP

      12288:JHICZ9iSCnm8B/Hw9pVKGCs64DVdZ3+8qFXTjT+:JoC7ijwFKlVadZ3+8qNC

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

4
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks