General

  • Target

    d3c9fb925cc60b34166711d806f34592b333e3555d30a8957e89d08771768870

  • Size

    43KB

  • Sample

    221126-2qrcaaed4y

  • MD5

    0c054d512ebfcdade1a7ba714bfcf15f

  • SHA1

    26a8e96a5869dde53c2a731faa46e4e6d05c02f7

  • SHA256

    d3c9fb925cc60b34166711d806f34592b333e3555d30a8957e89d08771768870

  • SHA512

    43f20ffc30d514182d8ab81859339a8d20b8ca4f40787d9745408e7a595b5152bf73ff984ae9d69ce88cacba7e2b8c2fbf68bc5782986eb4209374e9229cab9e

  • SSDEEP

    768:3kPCnFY+CynO+svwSkhmN8A8Yqrh8tW8hJJdcMyi+y+YksHZC:UPCnOZVvwSkhmm1YqrC7vcMyi+yHHZC

Malware Config

Targets

    • Target

      d3c9fb925cc60b34166711d806f34592b333e3555d30a8957e89d08771768870

    • Size

      43KB

    • MD5

      0c054d512ebfcdade1a7ba714bfcf15f

    • SHA1

      26a8e96a5869dde53c2a731faa46e4e6d05c02f7

    • SHA256

      d3c9fb925cc60b34166711d806f34592b333e3555d30a8957e89d08771768870

    • SHA512

      43f20ffc30d514182d8ab81859339a8d20b8ca4f40787d9745408e7a595b5152bf73ff984ae9d69ce88cacba7e2b8c2fbf68bc5782986eb4209374e9229cab9e

    • SSDEEP

      768:3kPCnFY+CynO+svwSkhmN8A8Yqrh8tW8hJJdcMyi+y+YksHZC:UPCnOZVvwSkhmm1YqrC7vcMyi+yHHZC

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Disables taskbar notifications via registry modification

    • Deletes itself

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

4
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Tasks