General

  • Target

    d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9

  • Size

    704KB

  • Sample

    221205-2e9dqadd39

  • MD5

    01c8ccb0190c4ae2d1aa3bcd40dc3050

  • SHA1

    b885f05169d2a4987a953e6993b1243eba567408

  • SHA256

    d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9

  • SHA512

    d8a15c31d78d9349e111eb0b829aff06b92c43cf5aa58965201819053a7f5651a0065aa788475f6d0d76c37d66fb344fcd642b93d8d91038b76a1b54f9ba7962

  • SSDEEP

    12288:WpgvmzFHi0mo5aH0qMzd5807FmPJQPDHvd:WpgvOHi0mGaH0qSdPF44V

Malware Config

Targets

    • Target

      d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9

    • Size

      704KB

    • MD5

      01c8ccb0190c4ae2d1aa3bcd40dc3050

    • SHA1

      b885f05169d2a4987a953e6993b1243eba567408

    • SHA256

      d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9

    • SHA512

      d8a15c31d78d9349e111eb0b829aff06b92c43cf5aa58965201819053a7f5651a0065aa788475f6d0d76c37d66fb344fcd642b93d8d91038b76a1b54f9ba7962

    • SSDEEP

      12288:WpgvmzFHi0mo5aH0qMzd5807FmPJQPDHvd:WpgvOHi0mGaH0qSdPF44V

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks