General

  • Target

    9630e0b51a07e18c42537c8402d15319cc6ab8e7825037447b4c7a9e6ae5aaa3

  • Size

    456KB

  • Sample

    221201-k5lxnsgh2s

  • MD5

    3d5c3f2297871eb8462e9db0c1d3d03d

  • SHA1

    28f9c17733deb70a1dabdefef88ab43e99de6b04

  • SHA256

    9630e0b51a07e18c42537c8402d15319cc6ab8e7825037447b4c7a9e6ae5aaa3

  • SHA512

    963a223dbaa73ebdc01dc424e3d92578af189d6f09cf59f91e0913ff1d75f0d3c18ffb6bd2c8e37a9fb7b63f45622bfcf97b5472adab62e09f0da5bdcaa43c87

  • SSDEEP

    12288:IpUJ3r6YkVwJgNnSykgb9cqWnw4q6ZmFhqse:IpUNr6YkVRFkgbeqeo68Fhq/

Malware Config

Targets

    • Target

      9630e0b51a07e18c42537c8402d15319cc6ab8e7825037447b4c7a9e6ae5aaa3

    • Size

      456KB

    • MD5

      3d5c3f2297871eb8462e9db0c1d3d03d

    • SHA1

      28f9c17733deb70a1dabdefef88ab43e99de6b04

    • SHA256

      9630e0b51a07e18c42537c8402d15319cc6ab8e7825037447b4c7a9e6ae5aaa3

    • SHA512

      963a223dbaa73ebdc01dc424e3d92578af189d6f09cf59f91e0913ff1d75f0d3c18ffb6bd2c8e37a9fb7b63f45622bfcf97b5472adab62e09f0da5bdcaa43c87

    • SSDEEP

      12288:IpUJ3r6YkVwJgNnSykgb9cqWnw4q6ZmFhqse:IpUNr6YkVRFkgbeqeo68Fhq/

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks