General

  • Target

    02a4f14d6664a7dcca9e7917d7c0fb72

  • Size

    484KB

  • Sample

    231224-scvywadbf7

  • MD5

    02a4f14d6664a7dcca9e7917d7c0fb72

  • SHA1

    2ca2c9ce27844e032c23d0199dd3cd19af56620e

  • SHA256

    21c5b96d93c19d6d1717f1ff1080a09cf7f42d9615796fc4270ebc0ea436c4df

  • SHA512

    5bf95fd34d565690916d996688c876bb3d7f9243c582686ab8b2aed0d9b67ec60a379dfaee0b65f4cb60be8d8272590241936d4580cfe4423ca0e170fa56bdcc

  • SSDEEP

    6144:u1QMivgpQ25+yApTCg3cz6ufWeLuIrybTQg9o214QTB2I/51pftDKHpDbU69SWvh:OQMiG+2gef5x/xQTB2OfDKC7WgcOc

Malware Config

Targets

    • Target

      02a4f14d6664a7dcca9e7917d7c0fb72

    • Size

      484KB

    • MD5

      02a4f14d6664a7dcca9e7917d7c0fb72

    • SHA1

      2ca2c9ce27844e032c23d0199dd3cd19af56620e

    • SHA256

      21c5b96d93c19d6d1717f1ff1080a09cf7f42d9615796fc4270ebc0ea436c4df

    • SHA512

      5bf95fd34d565690916d996688c876bb3d7f9243c582686ab8b2aed0d9b67ec60a379dfaee0b65f4cb60be8d8272590241936d4580cfe4423ca0e170fa56bdcc

    • SSDEEP

      6144:u1QMivgpQ25+yApTCg3cz6ufWeLuIrybTQg9o214QTB2I/51pftDKHpDbU69SWvh:OQMiG+2gef5x/xQTB2OfDKC7WgcOc

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks