General

  • Target

    1bf79e43d0594960d34b905ea7c624007dd927eb3702c8b49963f9adf26111c2

  • Size

    536KB

  • Sample

    221204-rc2wraeg83

  • MD5

    40a9963d66c283a1ae5389416debdf87

  • SHA1

    0fdff554de5b0ec913ac6f4991740d13ac7c9ae3

  • SHA256

    1bf79e43d0594960d34b905ea7c624007dd927eb3702c8b49963f9adf26111c2

  • SHA512

    fe77faf8ca3fd8bf867d138fb577764544ededb15dd86ec8000b906902b1236e5ecaa676a71ebed1465a7d7b776f23053a102ca1da9632208fd6b3710597a9a2

  • SSDEEP

    6144:hj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdrionJOnw:R6onxOp8FySpE5zvIdtU+Ymef1S2

Malware Config

Targets

    • Target

      1bf79e43d0594960d34b905ea7c624007dd927eb3702c8b49963f9adf26111c2

    • Size

      536KB

    • MD5

      40a9963d66c283a1ae5389416debdf87

    • SHA1

      0fdff554de5b0ec913ac6f4991740d13ac7c9ae3

    • SHA256

      1bf79e43d0594960d34b905ea7c624007dd927eb3702c8b49963f9adf26111c2

    • SHA512

      fe77faf8ca3fd8bf867d138fb577764544ededb15dd86ec8000b906902b1236e5ecaa676a71ebed1465a7d7b776f23053a102ca1da9632208fd6b3710597a9a2

    • SSDEEP

      6144:hj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdrionJOnw:R6onxOp8FySpE5zvIdtU+Ymef1S2

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks