General
-
Target
_ok7GZnMnKLx-V_SGjfbzqSUfN4Ec8UuYAkHwKy0u8Q.bin
-
Size
58.4MB
-
Sample
230308-t1px7sce5t
-
MD5
baabd73bcc36410b8ac2c583256daea4
-
SHA1
8cff0fd52aea3e2f4f1e0613a6a37b9c7efa88fb
-
SHA256
fa893b1999cc9ca2f1fd5f921a37dbcea4947cde0473c52e600907c0acb4bbc4
-
SHA512
e6f213a8d1a0620f297321a5f283bfc255d8cb7d6e3db5a00b4f5168d910ebca8f1e982f3d0282bff807bae858923632504b91e42df7a0763a566f04643d7d35
-
SSDEEP
196608:GG0RJ4w+cFJV75PVvpc/03hAKTwNqPCH9b3Tw73g2onpsdlqloY2Z8Cm8H8nIgX6:GGC4w+cVnWKVK5w73EpsdtY2aCmAX
Static task
static1
Behavioral task
behavioral1
Sample
_ok7GZnMnKLx-V_SGjfbzqSUfN4Ec8UuYAkHwKy0u8Q.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
_ok7GZnMnKLx-V_SGjfbzqSUfN4Ec8UuYAkHwKy0u8Q.bin
-
Size
58.4MB
-
MD5
baabd73bcc36410b8ac2c583256daea4
-
SHA1
8cff0fd52aea3e2f4f1e0613a6a37b9c7efa88fb
-
SHA256
fa893b1999cc9ca2f1fd5f921a37dbcea4947cde0473c52e600907c0acb4bbc4
-
SHA512
e6f213a8d1a0620f297321a5f283bfc255d8cb7d6e3db5a00b4f5168d910ebca8f1e982f3d0282bff807bae858923632504b91e42df7a0763a566f04643d7d35
-
SSDEEP
196608:GG0RJ4w+cFJV75PVvpc/03hAKTwNqPCH9b3Tw73g2onpsdlqloY2Z8Cm8H8nIgX6:GGC4w+cVnWKVK5w73EpsdtY2aCmAX
-
Disables use of System Restore points
-
Drops file in Drivers directory
-
Possible privilege escalation attempt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Hidden Files and Directories
2Scheduled Task
1