General
-
Target
fbfdbbc62b35284e7d5b75c32b7cda10
-
Size
1.5MB
-
Sample
231228-15kydadcgk
-
MD5
fbfdbbc62b35284e7d5b75c32b7cda10
-
SHA1
a6ba33b2c0ebc9d3618398b99b123c0a7310914b
-
SHA256
19c449ff446bfa5dbd227232b4a778bad834cb39ca5e4522ccdcedf3303b3b1d
-
SHA512
39204ff523aac565492c0ab9cf6ec5c77132f031cf6b5f75707cd3c36f52eae89d68e62c0aad2dc90c6d5aac6ea7d425da7763d22af666ecce910141e2ea0384
-
SSDEEP
3072:0Dy+IvWylpIB7lxjn7wq6xwL0outeL5ctut/UX7xEgrD1asomkXokpAo9Pnx0UPD:AevdI3x8q6KL0oSeL5tt/wdaN7Co70
Behavioral task
behavioral1
Sample
fbfdbbc62b35284e7d5b75c32b7cda10.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
fbfdbbc62b35284e7d5b75c32b7cda10
-
Size
1.5MB
-
MD5
fbfdbbc62b35284e7d5b75c32b7cda10
-
SHA1
a6ba33b2c0ebc9d3618398b99b123c0a7310914b
-
SHA256
19c449ff446bfa5dbd227232b4a778bad834cb39ca5e4522ccdcedf3303b3b1d
-
SHA512
39204ff523aac565492c0ab9cf6ec5c77132f031cf6b5f75707cd3c36f52eae89d68e62c0aad2dc90c6d5aac6ea7d425da7763d22af666ecce910141e2ea0384
-
SSDEEP
3072:0Dy+IvWylpIB7lxjn7wq6xwL0outeL5ctut/UX7xEgrD1asomkXokpAo9Pnx0UPD:AevdI3x8q6KL0oSeL5tt/wdaN7Co70
-
Modifies firewall policy service
-
Modifies security service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2