General

  • Target

    3eb93a561ba9bd10e985e8a5dc82414ee393e9cf0b6d098eb21dd2854b2cbbb8

  • Size

    442KB

  • Sample

    221124-gj9vtscg73

  • MD5

    ab901397b9b6c02b2f770db9eb3d2eed

  • SHA1

    1d9288f6799af0c019bf23f94f1f67c037e069c2

  • SHA256

    3eb93a561ba9bd10e985e8a5dc82414ee393e9cf0b6d098eb21dd2854b2cbbb8

  • SHA512

    a2e6a03aab85501c86de581372a9b842b5fb02362805a92e43ac3bde4e423c6cd98464a9f74ba3c6830776a93e5c5a567e8a26db161988389d099d9dc98cd9b9

  • SSDEEP

    12288:JHICZ9iSCnm8B/Hw9pVKGCs64DVdZ3+8qFXTjt:JoC7ijwFKlVadZ3+8qNt

Malware Config

Targets

    • Target

      3eb93a561ba9bd10e985e8a5dc82414ee393e9cf0b6d098eb21dd2854b2cbbb8

    • Size

      442KB

    • MD5

      ab901397b9b6c02b2f770db9eb3d2eed

    • SHA1

      1d9288f6799af0c019bf23f94f1f67c037e069c2

    • SHA256

      3eb93a561ba9bd10e985e8a5dc82414ee393e9cf0b6d098eb21dd2854b2cbbb8

    • SHA512

      a2e6a03aab85501c86de581372a9b842b5fb02362805a92e43ac3bde4e423c6cd98464a9f74ba3c6830776a93e5c5a567e8a26db161988389d099d9dc98cd9b9

    • SSDEEP

      12288:JHICZ9iSCnm8B/Hw9pVKGCs64DVdZ3+8qFXTjt:JoC7ijwFKlVadZ3+8qNt

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

4
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks