General

  • Target

    73b403c8d238607970c95def5547d014fa246266a9f584d6c563981a639ea671

  • Size

    95KB

  • Sample

    230103-f58dfsaa89

  • MD5

    2dbb19618eb730077e80a26464602444

  • SHA1

    f3b9459d2b8a37564b7c3c362eaad80eb52ce51c

  • SHA256

    73b403c8d238607970c95def5547d014fa246266a9f584d6c563981a639ea671

  • SHA512

    27422a042422611d697a31e2d1adb1f3a2c352c41dcd98ef99dd90d2a356504ffa635f9b19e8a6ed93a7d8e1651d47f2bf9e8947e081322f7e9d96ce9d4a75cc

  • SSDEEP

    768:nCZJPEBGc8Kg0jIRbw4+UA3dKNE5oZTiU4oOBhUT7SV3h0A9U8tnuDst1sXXtYcX:APEJ879bwBTR1sXvwVcl

Malware Config

Targets

    • Target

      73b403c8d238607970c95def5547d014fa246266a9f584d6c563981a639ea671

    • Size

      95KB

    • MD5

      2dbb19618eb730077e80a26464602444

    • SHA1

      f3b9459d2b8a37564b7c3c362eaad80eb52ce51c

    • SHA256

      73b403c8d238607970c95def5547d014fa246266a9f584d6c563981a639ea671

    • SHA512

      27422a042422611d697a31e2d1adb1f3a2c352c41dcd98ef99dd90d2a356504ffa635f9b19e8a6ed93a7d8e1651d47f2bf9e8947e081322f7e9d96ce9d4a75cc

    • SSDEEP

      768:nCZJPEBGc8Kg0jIRbw4+UA3dKNE5oZTiU4oOBhUT7SV3h0A9U8tnuDst1sXXtYcX:APEJ879bwBTR1sXvwVcl

    • UAC bypass

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Modifies file permissions

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

File Permissions Modification

1
T1222

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks