General

  • Target

    fb9102e77f496a40d7e54536bc3dfb634ca523d97a2abf5da0d722326e113047

  • Size

    452KB

  • Sample

    221124-gjflzsfg2s

  • MD5

    6dc4bb7c22a012ff0ea4f1209dd0fc1f

  • SHA1

    403e4b2d0f8179e5b01ef30a03f8f7435741896c

  • SHA256

    fb9102e77f496a40d7e54536bc3dfb634ca523d97a2abf5da0d722326e113047

  • SHA512

    3fd1ae787dd5aa8f20a87042175a3a06e0c98a42bd69c0fcfe3e05816d389938e1339c181e80ab353b4a32f038725014c96a038078173ce053bbe2204de275bc

  • SSDEEP

    12288:JHICZ9iSCnm8B/Hw9pVKGCs64DVdZ3+8qFXTj82:JoC7ijwFKlVadZ3+8qNp

Malware Config

Targets

    • Target

      fb9102e77f496a40d7e54536bc3dfb634ca523d97a2abf5da0d722326e113047

    • Size

      452KB

    • MD5

      6dc4bb7c22a012ff0ea4f1209dd0fc1f

    • SHA1

      403e4b2d0f8179e5b01ef30a03f8f7435741896c

    • SHA256

      fb9102e77f496a40d7e54536bc3dfb634ca523d97a2abf5da0d722326e113047

    • SHA512

      3fd1ae787dd5aa8f20a87042175a3a06e0c98a42bd69c0fcfe3e05816d389938e1339c181e80ab353b4a32f038725014c96a038078173ce053bbe2204de275bc

    • SSDEEP

      12288:JHICZ9iSCnm8B/Hw9pVKGCs64DVdZ3+8qFXTj82:JoC7ijwFKlVadZ3+8qNp

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

4
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks