General

  • Target

    67387611c614dff5cd7b6fc938ae38a88520c7fa3e16be72c0b84414de84b6ed

  • Size

    492KB

  • Sample

    221130-3d8w8sec35

  • MD5

    2b3ce24e444d93996e1f1da00e37816d

  • SHA1

    b5c2525f9ecba5e3542ea54633f5fdc794c87448

  • SHA256

    67387611c614dff5cd7b6fc938ae38a88520c7fa3e16be72c0b84414de84b6ed

  • SHA512

    0d09cd5417d66f1092f1964d56dc7f10a9fff17221b10ac67b176b2d9c3fb50c3c26a10d9e28a7a132e0cce3f614420964b05847ba5899540c551044e7ca3ae8

  • SSDEEP

    12288:J2iwn/ND7S3xI66S/H3UyKxWn2hJ+MRmhhhQoW:J213Sed0XjhG

Malware Config

Targets

    • Target

      67387611c614dff5cd7b6fc938ae38a88520c7fa3e16be72c0b84414de84b6ed

    • Size

      492KB

    • MD5

      2b3ce24e444d93996e1f1da00e37816d

    • SHA1

      b5c2525f9ecba5e3542ea54633f5fdc794c87448

    • SHA256

      67387611c614dff5cd7b6fc938ae38a88520c7fa3e16be72c0b84414de84b6ed

    • SHA512

      0d09cd5417d66f1092f1964d56dc7f10a9fff17221b10ac67b176b2d9c3fb50c3c26a10d9e28a7a132e0cce3f614420964b05847ba5899540c551044e7ca3ae8

    • SSDEEP

      12288:J2iwn/ND7S3xI66S/H3UyKxWn2hJ+MRmhhhQoW:J213Sed0XjhG

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks