General
-
Target
6fac08c40dea0fbcd5adec7644cb15b9ddd3e4296553fe2c1aeaebe4804dc4f0
-
Size
11.7MB
-
Sample
231222-k6ppysgdc9
-
MD5
4f4beb5ea018df98e128e697fbe2b5a2
-
SHA1
62b7e735bee3fbb3c7187e0eae328035be09c808
-
SHA256
6fac08c40dea0fbcd5adec7644cb15b9ddd3e4296553fe2c1aeaebe4804dc4f0
-
SHA512
8f17c40feece377dafe712004756dd2fa61bae05238c3c4527e2c5dad0bdd39dfca90ce3a0315c1ad994d0a18bcdad08ff76c777b60fd2b23c2c74e501dba15e
-
SSDEEP
12288:IXgvmzFHi0mo5aH0qMzd58s7Ft+tvPJQPDHvd:IXgvOHi0mGaH0qSdHFt6J4V
Static task
static1
Behavioral task
behavioral1
Sample
6fac08c40dea0fbcd5adec7644cb15b9ddd3e4296553fe2c1aeaebe4804dc4f0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6fac08c40dea0fbcd5adec7644cb15b9ddd3e4296553fe2c1aeaebe4804dc4f0.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
6fac08c40dea0fbcd5adec7644cb15b9ddd3e4296553fe2c1aeaebe4804dc4f0
-
Size
11.7MB
-
MD5
4f4beb5ea018df98e128e697fbe2b5a2
-
SHA1
62b7e735bee3fbb3c7187e0eae328035be09c808
-
SHA256
6fac08c40dea0fbcd5adec7644cb15b9ddd3e4296553fe2c1aeaebe4804dc4f0
-
SHA512
8f17c40feece377dafe712004756dd2fa61bae05238c3c4527e2c5dad0bdd39dfca90ce3a0315c1ad994d0a18bcdad08ff76c777b60fd2b23c2c74e501dba15e
-
SSDEEP
12288:IXgvmzFHi0mo5aH0qMzd58s7Ft+tvPJQPDHvd:IXgvOHi0mGaH0qSdHFt6J4V
Score10/10-
Modifies WinLogon for persistence
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5