General

  • Target

    75a28c02aa1bb752bd2d4705507dd2eeae9a815b0184f1167af2779d4d0b78f1

  • Size

    634KB

  • Sample

    221126-llgpaage44

  • MD5

    b1c16565af7e34889353faf43c827ef6

  • SHA1

    d9938c3c0a8d24ff3f9bdc1eebe063e6a052aa3c

  • SHA256

    75a28c02aa1bb752bd2d4705507dd2eeae9a815b0184f1167af2779d4d0b78f1

  • SHA512

    85945ec722dd0b487f01c0ac5b2c77a30fc967faedadfa9d0fca5299d0154c6eace9afa529c59920eccad3b5617e23f5ed16ccec24d5aeb8bb7dd8dbfa40b767

  • SSDEEP

    12288:zqSEbve3Gd+6iJZ0ICKiyKmODbX+B/HeDc4isyHW73VBXv:zqVms0ZL3qT+yc2CQV9

Malware Config

Targets

    • Target

      75a28c02aa1bb752bd2d4705507dd2eeae9a815b0184f1167af2779d4d0b78f1

    • Size

      634KB

    • MD5

      b1c16565af7e34889353faf43c827ef6

    • SHA1

      d9938c3c0a8d24ff3f9bdc1eebe063e6a052aa3c

    • SHA256

      75a28c02aa1bb752bd2d4705507dd2eeae9a815b0184f1167af2779d4d0b78f1

    • SHA512

      85945ec722dd0b487f01c0ac5b2c77a30fc967faedadfa9d0fca5299d0154c6eace9afa529c59920eccad3b5617e23f5ed16ccec24d5aeb8bb7dd8dbfa40b767

    • SSDEEP

      12288:zqSEbve3Gd+6iJZ0ICKiyKmODbX+B/HeDc4isyHW73VBXv:zqVms0ZL3qT+yc2CQV9

    • Ammyy Admin

      Remote admin tool with various capabilities.

    • AmmyyAdmin payload

    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks