General

  • Target

    ADZP 20 Complex.py

  • Size

    28KB

  • Sample

    230609-11f4maed3y

  • MD5

    814a7febd0150340ce60732e3cc160a3

  • SHA1

    24345ef05caa8daecd05b7120441c5de015dc034

  • SHA256

    68a98ffe76117fa078876785eaa9f989072103e1f4f808ec1485c817c5dc0294

  • SHA512

    6fdff25a86a43cbe536e8581813dbfa6d7eaae8066448355c5d45184b103ca55582ae6409b8cb9c75c4f5edb205faf9da1870bfb1a6d2d173a37dd39858ef951

  • SSDEEP

    384:0OalBvibjapET2V1IAPR6vzkiqkP4BhNRl9Fhyfsw:wlW6V1IAPgvzki1wBh3jIsw

Malware Config

Targets

    • Target

      ADZP 20 Complex.py

    • Size

      28KB

    • MD5

      814a7febd0150340ce60732e3cc160a3

    • SHA1

      24345ef05caa8daecd05b7120441c5de015dc034

    • SHA256

      68a98ffe76117fa078876785eaa9f989072103e1f4f808ec1485c817c5dc0294

    • SHA512

      6fdff25a86a43cbe536e8581813dbfa6d7eaae8066448355c5d45184b103ca55582ae6409b8cb9c75c4f5edb205faf9da1870bfb1a6d2d173a37dd39858ef951

    • SSDEEP

      384:0OalBvibjapET2V1IAPR6vzkiqkP4BhNRl9Fhyfsw:wlW6V1IAPgvzki1wBh3jIsw

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Execution

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

7
T1012

System Information Discovery

7
T1082

Peripheral Device Discovery

2
T1120

Lateral Movement

Replication Through Removable Media

1
T1091

Collection

Data from Local System

1
T1005

Tasks