General

  • Target

    aa_v3.zip

  • Size

    424KB

  • Sample

    230915-kv19lsce72

  • MD5

    c995a6db5bb7210322c72b92b0358393

  • SHA1

    96b4e0ac795a92c341d08c6b18f2d2664efd40fc

  • SHA256

    0abfee8952acaf9510e25ca4d6f2cdfdc790f527bbfc06d72b63c188a161878b

  • SHA512

    5bbf7393f7573cdc5cc095eb94cfd714d0d419628c2d5246c1a7abdaea7dbc1c8fdd938a07dcb6d48e0acf44b9100e6b62dce4e53edeffa6bf75c856ccac5128

  • SSDEEP

    6144:t0OF+EXUcqqDPM9hp7532F5P9phb7xtw382MBaouv/huqAh8PhM+53zR25rGC+Kd:tllPYFM/P9pOMhanhXX5Mw24cjvMlk

Malware Config

Targets

    • Target

      AA_v3.exe

    • Size

      798KB

    • MD5

      90aadf2247149996ae443e2c82af3730

    • SHA1

      050b7eba825412b24e3f02d76d7da5ae97e10502

    • SHA256

      ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a

    • SHA512

      eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be

    • SSDEEP

      24576:Uj0JJ4p/A4npt3XojeQG5EtzRtO7GvmDguXd:UjoJ4u4zojegylDN

    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks