General

  • Target

    6675a042092a919dcce01d4150bf2013c2d95fca2f1957411af6f1ffd7a8f5ce

  • Size

    524KB

  • Sample

    221204-qzlmlsde85

  • MD5

    0668d7bf1ae86b7b384fe2ad5a27c9a5

  • SHA1

    9cfa516f684ddd34f8117abfb59beb36033606b4

  • SHA256

    6675a042092a919dcce01d4150bf2013c2d95fca2f1957411af6f1ffd7a8f5ce

  • SHA512

    51b633a3cba7b26f9f2fdf74ae950a04c4a6cd4c874cf73bc9840c1fe81805a396f16e47e5c986a2ee468add0e94589ab05671fd95868d272e842cec7d992983

  • SSDEEP

    6144:6IXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHUSCnDU:6IXsgtvm1De5YlOx6lzBH46Ut4

Malware Config

Targets

    • Target

      6675a042092a919dcce01d4150bf2013c2d95fca2f1957411af6f1ffd7a8f5ce

    • Size

      524KB

    • MD5

      0668d7bf1ae86b7b384fe2ad5a27c9a5

    • SHA1

      9cfa516f684ddd34f8117abfb59beb36033606b4

    • SHA256

      6675a042092a919dcce01d4150bf2013c2d95fca2f1957411af6f1ffd7a8f5ce

    • SHA512

      51b633a3cba7b26f9f2fdf74ae950a04c4a6cd4c874cf73bc9840c1fe81805a396f16e47e5c986a2ee468add0e94589ab05671fd95868d272e842cec7d992983

    • SSDEEP

      6144:6IXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHUSCnDU:6IXsgtvm1De5YlOx6lzBH46Ut4

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks