General

  • Target

    50751790e18e917268c6ea71774806cf857de4f9fa85ff38585d17751e3ddd75

  • Size

    1.5MB

  • Sample

    230612-klmpvsbb27

  • MD5

    2fa219cd06321548dfcd5fbe7a3ea717

  • SHA1

    4c9e1cfdf6eae91a862d5bccb8031acdc8399771

  • SHA256

    50751790e18e917268c6ea71774806cf857de4f9fa85ff38585d17751e3ddd75

  • SHA512

    8c045ccf10827dca95a7bbde72d7eedc1ccee3acbfa50450c5995c0ec9d7b777fa4f3743ce69d8a946763cba03d50138abc338c5eb27b0b8f4750e328ca9b2af

  • SSDEEP

    24576:BUBOm6E14+kMHm2wGYeAI2/FwBuqJNblwRCJFFOSyzQO:BUBOmXe+FHmyJAI2WBukNbWcOSA

Score
10/10

Malware Config

Targets

    • Target

      50751790e18e917268c6ea71774806cf857de4f9fa85ff38585d17751e3ddd75

    • Size

      1.5MB

    • MD5

      2fa219cd06321548dfcd5fbe7a3ea717

    • SHA1

      4c9e1cfdf6eae91a862d5bccb8031acdc8399771

    • SHA256

      50751790e18e917268c6ea71774806cf857de4f9fa85ff38585d17751e3ddd75

    • SHA512

      8c045ccf10827dca95a7bbde72d7eedc1ccee3acbfa50450c5995c0ec9d7b777fa4f3743ce69d8a946763cba03d50138abc338c5eb27b0b8f4750e328ca9b2af

    • SSDEEP

      24576:BUBOm6E14+kMHm2wGYeAI2/FwBuqJNblwRCJFFOSyzQO:BUBOmXe+FHmyJAI2WBukNbWcOSA

    Score
    10/10
    • UAC bypass

    • Downloads MZ/PE file

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks