General

  • Target

    1813cdbea071efd7e0b261e0b1f47635

  • Size

    7.6MB

  • Sample

    221125-dzt8jacb8z

  • MD5

    1813cdbea071efd7e0b261e0b1f47635

  • SHA1

    cb7bfedfa84c2de310fdf36b6fac39c6d8a6c971

  • SHA256

    43834f452190b6f36ce8bb603b76e44feb45761eb70eae5dee2ac8db17d560ee

  • SHA512

    a5ac24cff7a276acc8d629dcb170c51ee8c1d65960f0fbf105a775264a63264bfb126008e5ea4daba812ef1d79881bda3e077bb1349166d474a609dd06e65b77

  • SSDEEP

    196608:4AId0+vNSQpice0XxZcTjfKYQGj8jFDO/3V1hoGv:4zm+v9eeQjCBnjNO/FTXv

Malware Config

Targets

    • Target

      1813cdbea071efd7e0b261e0b1f47635

    • Size

      7.6MB

    • MD5

      1813cdbea071efd7e0b261e0b1f47635

    • SHA1

      cb7bfedfa84c2de310fdf36b6fac39c6d8a6c971

    • SHA256

      43834f452190b6f36ce8bb603b76e44feb45761eb70eae5dee2ac8db17d560ee

    • SHA512

      a5ac24cff7a276acc8d629dcb170c51ee8c1d65960f0fbf105a775264a63264bfb126008e5ea4daba812ef1d79881bda3e077bb1349166d474a609dd06e65b77

    • SSDEEP

      196608:4AId0+vNSQpice0XxZcTjfKYQGj8jFDO/3V1hoGv:4zm+v9eeQjCBnjNO/FTXv

    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v6

Tasks