General

  • Target

    100a74df616b79e8edcddeea916618b6

  • Size

    492KB

  • Sample

    231230-f7m6asebak

  • MD5

    100a74df616b79e8edcddeea916618b6

  • SHA1

    422d6beff33a185c591cb7c172c68d11315e330a

  • SHA256

    9f7a095cb1184e6f219ed41bd9671d0bb5f1fbfab60f2b662e5b3ab31283e21d

  • SHA512

    afada613cca10fb0ed7088b8a69e98c3c33130fc3ce6f3d844adbfe8fff72c5c66582a369681a3a16338f61e24afdb8e2924c3296bda7d30d630ad49c810a9e9

  • SSDEEP

    12288:JK2iwn/ND7S3xI66S/H3UyKxWn2hJ+MRmhhhn:JK213Sed0XjhV

Malware Config

Targets

    • Target

      100a74df616b79e8edcddeea916618b6

    • Size

      492KB

    • MD5

      100a74df616b79e8edcddeea916618b6

    • SHA1

      422d6beff33a185c591cb7c172c68d11315e330a

    • SHA256

      9f7a095cb1184e6f219ed41bd9671d0bb5f1fbfab60f2b662e5b3ab31283e21d

    • SHA512

      afada613cca10fb0ed7088b8a69e98c3c33130fc3ce6f3d844adbfe8fff72c5c66582a369681a3a16338f61e24afdb8e2924c3296bda7d30d630ad49c810a9e9

    • SSDEEP

      12288:JK2iwn/ND7S3xI66S/H3UyKxWn2hJ+MRmhhhn:JK213Sed0XjhV

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks