General

  • Target

    e9d042a8814c8b87bc727b708553f11a8621ad5178a3c17ebe54a9a22ee24dce

  • Size

    626KB

  • Sample

    221203-ntgelabb9x

  • MD5

    fb62e200f8442793ebcf62a7d07cc534

  • SHA1

    a724b7bc304ed48519dbc1f319249ae7ac527b90

  • SHA256

    e9d042a8814c8b87bc727b708553f11a8621ad5178a3c17ebe54a9a22ee24dce

  • SHA512

    a7d070252cce3c41174bf4b779a34ef1da07a28835a03146ec8afbd0d8483879b54f98760de8629fc2873786ff19ab25841823eafe766d86946052a17c919e6c

  • SSDEEP

    12288:5Tsi+QKSVDBdCqyveWl3rfg3Sd8uLEm9A0M2:Wi+QHD/Cqyv13k3w4f2

Malware Config

Targets

    • Target

      e9d042a8814c8b87bc727b708553f11a8621ad5178a3c17ebe54a9a22ee24dce

    • Size

      626KB

    • MD5

      fb62e200f8442793ebcf62a7d07cc534

    • SHA1

      a724b7bc304ed48519dbc1f319249ae7ac527b90

    • SHA256

      e9d042a8814c8b87bc727b708553f11a8621ad5178a3c17ebe54a9a22ee24dce

    • SHA512

      a7d070252cce3c41174bf4b779a34ef1da07a28835a03146ec8afbd0d8483879b54f98760de8629fc2873786ff19ab25841823eafe766d86946052a17c919e6c

    • SSDEEP

      12288:5Tsi+QKSVDBdCqyveWl3rfg3Sd8uLEm9A0M2:Wi+QHD/Cqyv13k3w4f2

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks