General

  • Target

    image_2023-11-11_143314064.png

  • Size

    362KB

  • Sample

    231111-rwzkqsgg2s

  • MD5

    2773b91a26b11aaac1070b2569b0e9e2

  • SHA1

    7c91eab6834508ba2f6b046bcd412167dc85dee8

  • SHA256

    c1280965ee3f446489069a1ef84c3e0591209c10f538e32cdce67af367d92818

  • SHA512

    3efbdbbd729df8c4f6253e0728b39faef9bf762afe2a0141fbab46075ceb244f2d584de859dc9b78a6baf95f1c8417e2e16a255e6536ab6b31e9f78f5874ef85

  • SSDEEP

    6144:MZMPZ7K6+WuPZMweORstdC7XfLcJNbcbbbe068QjxsylbT1uIyBc62qVJJ4YVhFO:MmRKnP+weOAdWLcfAXbBQjxXbRtyXikO

Malware Config

Targets

    • Target

      image_2023-11-11_143314064.png

    • Size

      362KB

    • MD5

      2773b91a26b11aaac1070b2569b0e9e2

    • SHA1

      7c91eab6834508ba2f6b046bcd412167dc85dee8

    • SHA256

      c1280965ee3f446489069a1ef84c3e0591209c10f538e32cdce67af367d92818

    • SHA512

      3efbdbbd729df8c4f6253e0728b39faef9bf762afe2a0141fbab46075ceb244f2d584de859dc9b78a6baf95f1c8417e2e16a255e6536ab6b31e9f78f5874ef85

    • SSDEEP

      6144:MZMPZ7K6+WuPZMweORstdC7XfLcJNbcbbbe068QjxsylbT1uIyBc62qVJJ4YVhFO:MmRKnP+weOAdWLcfAXbBQjxXbRtyXikO

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks