General

  • Target

    0d3864ad40a03d360c6d8cd3d576683e

  • Size

    243KB

  • Sample

    231230-d7kdasgbf9

  • MD5

    0d3864ad40a03d360c6d8cd3d576683e

  • SHA1

    75c107e3d60e4092fd6b615a306276da2896ee91

  • SHA256

    777e5668ddbca7ac83cd060c7d439b77ac2c478d56ea4e54a495f035466b5e8b

  • SHA512

    f27592b9128ec74f3d7d39d196f08c996dc23a1b4d41407b89442b7fcda2faf4fe66b39d99f51067ce22a9556977ea0bf8471bb4036f924b75d10b9b7fb42b0c

  • SSDEEP

    6144:K0sL59fW/FhMzWxK35o4PGMlYZWe9wz2ZHOSNUknAlsHMT2XlW:K0srfiFlxK35o4PGMEWjzwHnUH+lW

Score
10/10

Malware Config

Targets

    • Target

      0d3864ad40a03d360c6d8cd3d576683e

    • Size

      243KB

    • MD5

      0d3864ad40a03d360c6d8cd3d576683e

    • SHA1

      75c107e3d60e4092fd6b615a306276da2896ee91

    • SHA256

      777e5668ddbca7ac83cd060c7d439b77ac2c478d56ea4e54a495f035466b5e8b

    • SHA512

      f27592b9128ec74f3d7d39d196f08c996dc23a1b4d41407b89442b7fcda2faf4fe66b39d99f51067ce22a9556977ea0bf8471bb4036f924b75d10b9b7fb42b0c

    • SSDEEP

      6144:K0sL59fW/FhMzWxK35o4PGMlYZWe9wz2ZHOSNUknAlsHMT2XlW:K0srfiFlxK35o4PGMEWjzwHnUH+lW

    Score
    10/10
    • Modifies WinLogon for persistence

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

1
T1112

Tasks