General

  • Target

    Photo.scr

  • Size

    5.9MB

  • Sample

    231008-rltazacg6y

  • MD5

    5616a3471565d34d779b5b3d0520bb70

  • SHA1

    42df726156bee4a54ea328bd72a659602ab7d03e

  • SHA256

    9194b57673209c8534888f61b0cdefa34f463ae50cd78f72ab2b3348220baaf9

  • SHA512

    21f70509a14eaf5dd63b533df612b64b07ff0e991d3a4ba3c17c9618bc952bccb61e189c04ca234fb374d2c75779aff108fd9bc7c44857e4034887b861058c1e

  • SSDEEP

    98304:RLbSThOfTCiFBXmfFs+JhEpCVoR8oMEOJ6Ty3RvX+UGD823FUuzmH:tBfTCiUs0VSLOJgyBGUA8Ch8

Malware Config

Targets

    • Target

      Photo.scr

    • Size

      5.9MB

    • MD5

      5616a3471565d34d779b5b3d0520bb70

    • SHA1

      42df726156bee4a54ea328bd72a659602ab7d03e

    • SHA256

      9194b57673209c8534888f61b0cdefa34f463ae50cd78f72ab2b3348220baaf9

    • SHA512

      21f70509a14eaf5dd63b533df612b64b07ff0e991d3a4ba3c17c9618bc952bccb61e189c04ca234fb374d2c75779aff108fd9bc7c44857e4034887b861058c1e

    • SSDEEP

      98304:RLbSThOfTCiFBXmfFs+JhEpCVoR8oMEOJ6Ty3RvX+UGD823FUuzmH:tBfTCiUs0VSLOJgyBGUA8Ch8

    • Modifies Windows Firewall

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Discovery

Network Service Discovery

1
T1046

Tasks