General
-
Target
1930fe7ebb2c3455eefed7928cf70bb4c421894cd0cf05ccd1df44b9f57c9b50
-
Size
4.2MB
-
Sample
231114-xz62wage9z
-
MD5
6a5ef94c6ee6b0a6308014c12bb0a163
-
SHA1
70877f371e82ca531fc43fee50d295d046d92740
-
SHA256
1930fe7ebb2c3455eefed7928cf70bb4c421894cd0cf05ccd1df44b9f57c9b50
-
SHA512
ad8ee3c015beca73bbb3b975d7caebe71fcababc76a41a3a1a8b058071e2525c96773dc913205feaf54fe5e4aa609f53638d65aae4acc9c7bd5b245c98cf8dc5
-
SSDEEP
6144:73ue8ySm8hQAAIfFrRXuEE+0l97mKwKTZZJZNxOT2mzcVeqHV986JQPDHDdx/Qtf:R/zkFF+EExZmKbiuV9PJQPDHvd
Static task
static1
Behavioral task
behavioral1
Sample
1930fe7ebb2c3455eefed7928cf70bb4c421894cd0cf05ccd1df44b9f57c9b50.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1930fe7ebb2c3455eefed7928cf70bb4c421894cd0cf05ccd1df44b9f57c9b50.exe
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
1930fe7ebb2c3455eefed7928cf70bb4c421894cd0cf05ccd1df44b9f57c9b50
-
Size
4.2MB
-
MD5
6a5ef94c6ee6b0a6308014c12bb0a163
-
SHA1
70877f371e82ca531fc43fee50d295d046d92740
-
SHA256
1930fe7ebb2c3455eefed7928cf70bb4c421894cd0cf05ccd1df44b9f57c9b50
-
SHA512
ad8ee3c015beca73bbb3b975d7caebe71fcababc76a41a3a1a8b058071e2525c96773dc913205feaf54fe5e4aa609f53638d65aae4acc9c7bd5b245c98cf8dc5
-
SSDEEP
6144:73ue8ySm8hQAAIfFrRXuEE+0l97mKwKTZZJZNxOT2mzcVeqHV986JQPDHDdx/Qtf:R/zkFF+EExZmKbiuV9PJQPDHvd
Score10/10-
Modifies WinLogon for persistence
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1