General

  • Target

    9834566e806fdd9f2afceb9897378bc38213b18fbc88e3ce125c7c9cdc28909e

  • Size

    138KB

  • Sample

    230129-qylwzsbb6t

  • MD5

    fa060f23e51febba321e0d1fc9bfa8cd

  • SHA1

    d0fa04ae2778037bc6ef107eaac86ed7ebcd84ee

  • SHA256

    9834566e806fdd9f2afceb9897378bc38213b18fbc88e3ce125c7c9cdc28909e

  • SHA512

    1d892e371932f17d939d67aae6185a505d430e3493c1071af8d64784b9dcf28139e299f4f9f0c02bbee477109c4e7a7df5790a5759b1d2d2da2adf33725af707

  • SSDEEP

    3072:MhjM+HG0S3gHdCf6RKHMpf8vNQ8Y/iPmH3jmKGlhn6nd6pPpj:wIWvHwf6RjCv6XjTMN6d6

Malware Config

Targets

    • Target

      9834566e806fdd9f2afceb9897378bc38213b18fbc88e3ce125c7c9cdc28909e

    • Size

      138KB

    • MD5

      fa060f23e51febba321e0d1fc9bfa8cd

    • SHA1

      d0fa04ae2778037bc6ef107eaac86ed7ebcd84ee

    • SHA256

      9834566e806fdd9f2afceb9897378bc38213b18fbc88e3ce125c7c9cdc28909e

    • SHA512

      1d892e371932f17d939d67aae6185a505d430e3493c1071af8d64784b9dcf28139e299f4f9f0c02bbee477109c4e7a7df5790a5759b1d2d2da2adf33725af707

    • SSDEEP

      3072:MhjM+HG0S3gHdCf6RKHMpf8vNQ8Y/iPmH3jmKGlhn6nd6pPpj:wIWvHwf6RjCv6XjTMN6d6

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

3
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks