General

  • Target

    86c0b9505d549357ef214184259a5e532d222f867c9eac739aef2814b0e03960

  • Size

    288KB

  • Sample

    221201-b6pwaadb82

  • MD5

    c9632c2364dfebbfde81f5dde5b7f404

  • SHA1

    bb000bcd8c56979d5932c90a6fac2c73b6328430

  • SHA256

    86c0b9505d549357ef214184259a5e532d222f867c9eac739aef2814b0e03960

  • SHA512

    703bead5c903d5e97d17f50b3f9fcc8c86e920ed44a3aa1ea164a444059c4376cdc376a42db366d1313a743e05d900501c4154e6a05991f4f5ae2e85abcebb41

  • SSDEEP

    3072:WJ6dMMfkqGIlxvu/JzMejSO1sJ6CaKMFFk8jwaaHw7Koj4r+5ywaYveQY5Pvzopf:JdMITlD2SOe05HF5ylQYdvcp4Vf

Malware Config

Targets

    • Target

      86c0b9505d549357ef214184259a5e532d222f867c9eac739aef2814b0e03960

    • Size

      288KB

    • MD5

      c9632c2364dfebbfde81f5dde5b7f404

    • SHA1

      bb000bcd8c56979d5932c90a6fac2c73b6328430

    • SHA256

      86c0b9505d549357ef214184259a5e532d222f867c9eac739aef2814b0e03960

    • SHA512

      703bead5c903d5e97d17f50b3f9fcc8c86e920ed44a3aa1ea164a444059c4376cdc376a42db366d1313a743e05d900501c4154e6a05991f4f5ae2e85abcebb41

    • SSDEEP

      3072:WJ6dMMfkqGIlxvu/JzMejSO1sJ6CaKMFFk8jwaaHw7Koj4r+5ywaYveQY5Pvzopf:JdMITlD2SOe05HF5ylQYdvcp4Vf

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks