Resubmissions

22/12/2023, 09:12

231222-k6ppysgdc9 10

22/12/2023, 07:47

231222-jmhlvsedh3 10

General

  • Target

    6fac08c40dea0fbcd5adec7644cb15b9ddd3e4296553fe2c1aeaebe4804dc4f0

  • Size

    11.7MB

  • Sample

    231222-k6ppysgdc9

  • MD5

    4f4beb5ea018df98e128e697fbe2b5a2

  • SHA1

    62b7e735bee3fbb3c7187e0eae328035be09c808

  • SHA256

    6fac08c40dea0fbcd5adec7644cb15b9ddd3e4296553fe2c1aeaebe4804dc4f0

  • SHA512

    8f17c40feece377dafe712004756dd2fa61bae05238c3c4527e2c5dad0bdd39dfca90ce3a0315c1ad994d0a18bcdad08ff76c777b60fd2b23c2c74e501dba15e

  • SSDEEP

    12288:IXgvmzFHi0mo5aH0qMzd58s7Ft+tvPJQPDHvd:IXgvOHi0mGaH0qSdHFt6J4V

Malware Config

Targets

    • Target

      6fac08c40dea0fbcd5adec7644cb15b9ddd3e4296553fe2c1aeaebe4804dc4f0

    • Size

      11.7MB

    • MD5

      4f4beb5ea018df98e128e697fbe2b5a2

    • SHA1

      62b7e735bee3fbb3c7187e0eae328035be09c808

    • SHA256

      6fac08c40dea0fbcd5adec7644cb15b9ddd3e4296553fe2c1aeaebe4804dc4f0

    • SHA512

      8f17c40feece377dafe712004756dd2fa61bae05238c3c4527e2c5dad0bdd39dfca90ce3a0315c1ad994d0a18bcdad08ff76c777b60fd2b23c2c74e501dba15e

    • SSDEEP

      12288:IXgvmzFHi0mo5aH0qMzd58s7Ft+tvPJQPDHvd:IXgvOHi0mGaH0qSdHFt6J4V

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks