General

  • Target

    6e8f3c2bfc537726a90b7fe7e3f4cf6f5b73a8389ed4d9caf241829350d70aa5

  • Size

    426KB

  • Sample

    221125-1m4mrshb33

  • MD5

    36f05fc6e1353917655db1b5a98341bd

  • SHA1

    dd5f29c01d639a91452fcd44f39cd33414a93e34

  • SHA256

    6e8f3c2bfc537726a90b7fe7e3f4cf6f5b73a8389ed4d9caf241829350d70aa5

  • SHA512

    c2705508fe81e1c3896d0b65acd7a69afd8161dfff616b2f29dcba50203ac44c8914ed3bd4eb785556729085e5fba2830e2474464fbb947c2889ddcd1b069d0c

  • SSDEEP

    12288:uHICZ9iSCnm8B/Hw9pnn0fwSnn1uTXlgdVt:uoC7ijw3wpUrlgd/

Malware Config

Targets

    • Target

      6e8f3c2bfc537726a90b7fe7e3f4cf6f5b73a8389ed4d9caf241829350d70aa5

    • Size

      426KB

    • MD5

      36f05fc6e1353917655db1b5a98341bd

    • SHA1

      dd5f29c01d639a91452fcd44f39cd33414a93e34

    • SHA256

      6e8f3c2bfc537726a90b7fe7e3f4cf6f5b73a8389ed4d9caf241829350d70aa5

    • SHA512

      c2705508fe81e1c3896d0b65acd7a69afd8161dfff616b2f29dcba50203ac44c8914ed3bd4eb785556729085e5fba2830e2474464fbb947c2889ddcd1b069d0c

    • SSDEEP

      12288:uHICZ9iSCnm8B/Hw9pnn0fwSnn1uTXlgdVt:uoC7ijw3wpUrlgd/

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

4
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks