General

  • Target

    1f4b313fd275795b932c52c6869f1b311c8392c958dded3de094968a454c4567

  • Size

    25.4MB

  • Sample

    231114-xnpy8adh56

  • MD5

    0f2e90e6eda60de9fb5bf4c808df3156

  • SHA1

    591f128d268b558afa9757a95126c09a77fb1da3

  • SHA256

    1f4b313fd275795b932c52c6869f1b311c8392c958dded3de094968a454c4567

  • SHA512

    43e9c68db6287f3cb1d75e8d91b525902b84f9e4d71a35b8a52fc83d37a091d5bce8eff18b6ffb7311fd2d00f290f186e1316bdc2f4f0db5da846bd9e9bea39e

  • SSDEEP

    6144:q3Be8ySm8hQAAIfFrRXuEE+0l97mKwKdwHV+86JQPDHDdx/Qtqa:P/zkFF+EExZmKbdQV+PJQPDHvd

Malware Config

Targets

    • Target

      1f4b313fd275795b932c52c6869f1b311c8392c958dded3de094968a454c4567

    • Size

      25.4MB

    • MD5

      0f2e90e6eda60de9fb5bf4c808df3156

    • SHA1

      591f128d268b558afa9757a95126c09a77fb1da3

    • SHA256

      1f4b313fd275795b932c52c6869f1b311c8392c958dded3de094968a454c4567

    • SHA512

      43e9c68db6287f3cb1d75e8d91b525902b84f9e4d71a35b8a52fc83d37a091d5bce8eff18b6ffb7311fd2d00f290f186e1316bdc2f4f0db5da846bd9e9bea39e

    • SSDEEP

      6144:q3Be8ySm8hQAAIfFrRXuEE+0l97mKwKdwHV+86JQPDHDdx/Qtqa:P/zkFF+EExZmKbdQV+PJQPDHvd

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks