General

  • Target

    bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191

  • Size

    740KB

  • Sample

    221125-nxjdcsee26

  • MD5

    9dfde97c1c4405efdd8a5251a616f62d

  • SHA1

    5b9fec92714726fa5d2fa88169aaec702ac53516

  • SHA256

    bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191

  • SHA512

    e23a0605deabbfa40943e85f1c6759e9ebe1da3b7c16d75fdd32369f6bc1841b76042e4ad9ad18b48ad03d0edf811a4d94e66f89d0f8619f198c4253ba40047b

  • SSDEEP

    12288:YyxUcfH81ctJ32+xC6NOPNWjIZT1XOzmhr8jrQ5/lGsU9kKARBCs4vuQHFo7MY8f:ocectp2+xC6NOPNWjIjOzmhirQ5/lG/7

Malware Config

Targets

    • Target

      bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191

    • Size

      740KB

    • MD5

      9dfde97c1c4405efdd8a5251a616f62d

    • SHA1

      5b9fec92714726fa5d2fa88169aaec702ac53516

    • SHA256

      bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191

    • SHA512

      e23a0605deabbfa40943e85f1c6759e9ebe1da3b7c16d75fdd32369f6bc1841b76042e4ad9ad18b48ad03d0edf811a4d94e66f89d0f8619f198c4253ba40047b

    • SSDEEP

      12288:YyxUcfH81ctJ32+xC6NOPNWjIZT1XOzmhr8jrQ5/lGsU9kKARBCs4vuQHFo7MY8f:ocectp2+xC6NOPNWjIjOzmhirQ5/lG/7

    • Ammyy Admin

      Remote admin tool with various capabilities.

    • AmmyyAdmin payload

    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks