General

  • Target

    69245805ae8143557ef964a56fe5ea876f79b8846bb36c65d5b76c39d2dba154

  • Size

    496KB

  • Sample

    221203-bywc4adc35

  • MD5

    aec35758dba374da1dd18ec586472585

  • SHA1

    27c59b537602d7853c07cb7ba3259702308e1eea

  • SHA256

    69245805ae8143557ef964a56fe5ea876f79b8846bb36c65d5b76c39d2dba154

  • SHA512

    65b27db3149fed5554d24d7a6bdd36bc578bc5c42233a55f8ec1a724c1dd0fdd94a7258976a0b9669729bb562ba8c5b0333cbe3eab9fa2a139ebab16f2a9a4b2

  • SSDEEP

    12288:VgkDxdkL+6JNgKVcRa+fpHyWs3OBH4pUm:VxsKXa+hHyWseBgP

Malware Config

Targets

    • Target

      69245805ae8143557ef964a56fe5ea876f79b8846bb36c65d5b76c39d2dba154

    • Size

      496KB

    • MD5

      aec35758dba374da1dd18ec586472585

    • SHA1

      27c59b537602d7853c07cb7ba3259702308e1eea

    • SHA256

      69245805ae8143557ef964a56fe5ea876f79b8846bb36c65d5b76c39d2dba154

    • SHA512

      65b27db3149fed5554d24d7a6bdd36bc578bc5c42233a55f8ec1a724c1dd0fdd94a7258976a0b9669729bb562ba8c5b0333cbe3eab9fa2a139ebab16f2a9a4b2

    • SSDEEP

      12288:VgkDxdkL+6JNgKVcRa+fpHyWs3OBH4pUm:VxsKXa+hHyWseBgP

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks