General

  • Target

    ADZP 20 Complex.py

  • Size

    28KB

  • Sample

    230609-14ed7sed4s

  • MD5

    1a17d1c76d6f025a4f26df53bb35adec

  • SHA1

    f7b15eb056d38cbba184fd7b92cd51a11b7f8952

  • SHA256

    ce039a0999621d4ec3422fccd4e8bdd23d67c30221ab51f91445c8d96f71263b

  • SHA512

    b45104137d6cfe91d78414e2015042493925ac158a14fa14a69c4e8a3a1d8d73d3f3df412a040282a927fabdd87caf992248c0408a316e1f377151e33246a5dd

  • SSDEEP

    384:0OalBvibjapET2V1IAPR6vzkiqkP4BhNRl9FhyfsI:wlW6V1IAPgvzki1wBh3jIsI

Malware Config

Targets

    • Target

      ADZP 20 Complex.py

    • Size

      28KB

    • MD5

      1a17d1c76d6f025a4f26df53bb35adec

    • SHA1

      f7b15eb056d38cbba184fd7b92cd51a11b7f8952

    • SHA256

      ce039a0999621d4ec3422fccd4e8bdd23d67c30221ab51f91445c8d96f71263b

    • SHA512

      b45104137d6cfe91d78414e2015042493925ac158a14fa14a69c4e8a3a1d8d73d3f3df412a040282a927fabdd87caf992248c0408a316e1f377151e33246a5dd

    • SSDEEP

      384:0OalBvibjapET2V1IAPR6vzkiqkP4BhNRl9FhyfsI:wlW6V1IAPgvzki1wBh3jIsI

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Execution

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

5
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Lateral Movement

Replication Through Removable Media

1
T1091

Collection

Data from Local System

1
T1005

Tasks