General

  • Target

    5c6735a4c8dc5c1b2ef9a8a1cad8ec6e80cfc2af189c82e5ccb2320792518a83

  • Size

    2.8MB

  • Sample

    230612-klnxxsbf9t

  • MD5

    1df74f0ec8b5359999ebb2116ae64ccd

  • SHA1

    a41a5236eaf7df0672d42a81f4e4ec9703ab9e99

  • SHA256

    5c6735a4c8dc5c1b2ef9a8a1cad8ec6e80cfc2af189c82e5ccb2320792518a83

  • SHA512

    47a3a7ae39ebae66ffe4f292ea3b2cc1cc5cf892a1fc5f6826af6c008c9ba174798c170d402379053ed20da716182e36ed375c988ea1282c6c0ce41339c4e702

  • SSDEEP

    49152:uZmH/P3uWK3BukNbWVZ6ZbaHcYz5aAVKiw6ZWqTG93jJ3hWpVcY:QmH3uJ3BPcg3Yz5J/693kf

Score
10/10

Malware Config

Targets

    • Target

      5c6735a4c8dc5c1b2ef9a8a1cad8ec6e80cfc2af189c82e5ccb2320792518a83

    • Size

      2.8MB

    • MD5

      1df74f0ec8b5359999ebb2116ae64ccd

    • SHA1

      a41a5236eaf7df0672d42a81f4e4ec9703ab9e99

    • SHA256

      5c6735a4c8dc5c1b2ef9a8a1cad8ec6e80cfc2af189c82e5ccb2320792518a83

    • SHA512

      47a3a7ae39ebae66ffe4f292ea3b2cc1cc5cf892a1fc5f6826af6c008c9ba174798c170d402379053ed20da716182e36ed375c988ea1282c6c0ce41339c4e702

    • SSDEEP

      49152:uZmH/P3uWK3BukNbWVZ6ZbaHcYz5aAVKiw6ZWqTG93jJ3hWpVcY:QmH3uJ3BPcg3Yz5J/693kf

    Score
    10/10
    • UAC bypass

    • Downloads MZ/PE file

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks