General

  • Target

    631508d9fa856a849a8693d03bdbc6ff10022e1ba74bd7e83319ee3b0cb20fde

  • Size

    31KB

  • Sample

    221203-hyya1sec89

  • MD5

    aad776dfd31f088920a489eb2433a718

  • SHA1

    dbbcb872085f97a4f0dbab09aba741a83009c607

  • SHA256

    631508d9fa856a849a8693d03bdbc6ff10022e1ba74bd7e83319ee3b0cb20fde

  • SHA512

    b811b9bbd332f3f7dde3d10c918a88b0f469e846035c8f015a4e5f319410b725226b579c1c22ba5f4e9f9e09e4f13fd1e80efb48b08f4a4bf111c1cd59df0fac

  • SSDEEP

    768:XeVJMedxVWT1q1kJ2yxQhUwMDlhT3IspEOYaRnbcuyD7UjNWGb:ukWnMq1e2MhnDltIspEOYcnouy8Jh

Malware Config

Targets

    • Target

      631508d9fa856a849a8693d03bdbc6ff10022e1ba74bd7e83319ee3b0cb20fde

    • Size

      31KB

    • MD5

      aad776dfd31f088920a489eb2433a718

    • SHA1

      dbbcb872085f97a4f0dbab09aba741a83009c607

    • SHA256

      631508d9fa856a849a8693d03bdbc6ff10022e1ba74bd7e83319ee3b0cb20fde

    • SHA512

      b811b9bbd332f3f7dde3d10c918a88b0f469e846035c8f015a4e5f319410b725226b579c1c22ba5f4e9f9e09e4f13fd1e80efb48b08f4a4bf111c1cd59df0fac

    • SSDEEP

      768:XeVJMedxVWT1q1kJ2yxQhUwMDlhT3IspEOYaRnbcuyD7UjNWGb:ukWnMq1e2MhnDltIspEOYcnouy8Jh

    • UAC bypass

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks