General

  • Target

    12d6aefbe859a8dc5676d7a77f3258a5cfdaa0cedabde4f1e773b68d46723f37

  • Size

    205KB

  • Sample

    221127-xcjytsea9x

  • MD5

    5132cdb1667fdab51bb004a625ffb0af

  • SHA1

    9bbbda764a8f5957babbb44f54a711ba10e0f25a

  • SHA256

    12d6aefbe859a8dc5676d7a77f3258a5cfdaa0cedabde4f1e773b68d46723f37

  • SHA512

    0b03520ed604041cf508b3c93cf6f1bbc0fdad602f9939944f8f102ec0fc993d8aa3f9bd226d86cf31020afaee434bb2c764ebf092e4c8844588e09d56c1d43b

  • SSDEEP

    3072:KqhMPssRhlARSOsdwD/98out3SDADeak7dJHB/AKG:KqhMPssRARoiSoS3SsQLH5AK

Malware Config

Targets

    • Target

      12d6aefbe859a8dc5676d7a77f3258a5cfdaa0cedabde4f1e773b68d46723f37

    • Size

      205KB

    • MD5

      5132cdb1667fdab51bb004a625ffb0af

    • SHA1

      9bbbda764a8f5957babbb44f54a711ba10e0f25a

    • SHA256

      12d6aefbe859a8dc5676d7a77f3258a5cfdaa0cedabde4f1e773b68d46723f37

    • SHA512

      0b03520ed604041cf508b3c93cf6f1bbc0fdad602f9939944f8f102ec0fc993d8aa3f9bd226d86cf31020afaee434bb2c764ebf092e4c8844588e09d56c1d43b

    • SSDEEP

      3072:KqhMPssRhlARSOsdwD/98out3SDADeak7dJHB/AKG:KqhMPssRARoiSoS3SsQLH5AK

    • Modifies WinLogon for persistence

    • Modifies system executable filetype association

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables use of System Restore points

    • Executes dropped EXE

    • Sets file execution options in registry

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks