General
-
Target
53bd9cac29cbb040b854c496db43b6f1120f756ca8b7a06b239e70e4bd5da12b
-
Size
255KB
-
Sample
221128-cn5dpagb37
-
MD5
8a18ebde47ce64d7b1fc63b52742ce5a
-
SHA1
f0d4e724d733ff6311e4821eabe2618fb40d9d2b
-
SHA256
53bd9cac29cbb040b854c496db43b6f1120f756ca8b7a06b239e70e4bd5da12b
-
SHA512
0d23e868b88c26616ed8c2ac3328bbb5c94fae98be83e4eb85389f67faf1213dd5aab35401a9e2619cde1e4cd3d7ca1a93f37eb13c3ad0316988dcc81682d117
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJF:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIW
Behavioral task
behavioral1
Sample
53bd9cac29cbb040b854c496db43b6f1120f756ca8b7a06b239e70e4bd5da12b.exe
Resource
win7-20221111-en
Malware Config
Targets
-
-
Target
53bd9cac29cbb040b854c496db43b6f1120f756ca8b7a06b239e70e4bd5da12b
-
Size
255KB
-
MD5
8a18ebde47ce64d7b1fc63b52742ce5a
-
SHA1
f0d4e724d733ff6311e4821eabe2618fb40d9d2b
-
SHA256
53bd9cac29cbb040b854c496db43b6f1120f756ca8b7a06b239e70e4bd5da12b
-
SHA512
0d23e868b88c26616ed8c2ac3328bbb5c94fae98be83e4eb85389f67faf1213dd5aab35401a9e2619cde1e4cd3d7ca1a93f37eb13c3ad0316988dcc81682d117
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJF:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIW
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Disables RegEdit via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies WinLogon
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7