General

  • Target

    7ccfbd3759f9c33ffd20b08db14724ce0ecf5a21212fc4dcd6e0cb83eb976fad

  • Size

    464KB

  • Sample

    221127-xnb3csfa6v

  • MD5

    52c4427adf949c20173f02b8efbad38f

  • SHA1

    f146c9f29641a8e61f28b17c2c65e8da034b7016

  • SHA256

    7ccfbd3759f9c33ffd20b08db14724ce0ecf5a21212fc4dcd6e0cb83eb976fad

  • SHA512

    b3d47920b278d8f81eab6806a62c060ad2f70831d45a79a5cdc3dc9903bec239b4a43137c2302877eb990ed8a7425e7e723b85c5768b834acefa78f1b1586677

  • SSDEEP

    6144:M5sH2oDritGBbml+nQLe7ByP9qKILtDhfMT4ow09rt9u6WlvTGdR:rbP8vQMP9qKILBdm4wrt0Gf

Malware Config

Targets

    • Target

      7ccfbd3759f9c33ffd20b08db14724ce0ecf5a21212fc4dcd6e0cb83eb976fad

    • Size

      464KB

    • MD5

      52c4427adf949c20173f02b8efbad38f

    • SHA1

      f146c9f29641a8e61f28b17c2c65e8da034b7016

    • SHA256

      7ccfbd3759f9c33ffd20b08db14724ce0ecf5a21212fc4dcd6e0cb83eb976fad

    • SHA512

      b3d47920b278d8f81eab6806a62c060ad2f70831d45a79a5cdc3dc9903bec239b4a43137c2302877eb990ed8a7425e7e723b85c5768b834acefa78f1b1586677

    • SSDEEP

      6144:M5sH2oDritGBbml+nQLe7ByP9qKILtDhfMT4ow09rt9u6WlvTGdR:rbP8vQMP9qKILBdm4wrt0Gf

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

4
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks