General

  • Target

    38690f12cca082d90d5d63f981c4132e

  • Size

    524KB

  • Sample

    231231-qy9ytaebhl

  • MD5

    38690f12cca082d90d5d63f981c4132e

  • SHA1

    7ec1b60e16759122cdc38dd3e3353af59f2bb52b

  • SHA256

    58bc31f79036d7a759d9abb5d260a169ef8682771b456a90108bf671d8de981d

  • SHA512

    926422a57e5b325f49bf08e2612c1f8d6f2c76905aab0385d80bdfb797a8109ac7da146ed579fa43b6109656d46bc194fe01535a26370545f3fdf02d1d338fd8

  • SSDEEP

    12288:DgkDxdkL+6JNgKVcRa+fpHyWs3OBH4pUGACR:/xsKXa+hHyWseBgQCR

Malware Config

Targets

    • Target

      38690f12cca082d90d5d63f981c4132e

    • Size

      524KB

    • MD5

      38690f12cca082d90d5d63f981c4132e

    • SHA1

      7ec1b60e16759122cdc38dd3e3353af59f2bb52b

    • SHA256

      58bc31f79036d7a759d9abb5d260a169ef8682771b456a90108bf671d8de981d

    • SHA512

      926422a57e5b325f49bf08e2612c1f8d6f2c76905aab0385d80bdfb797a8109ac7da146ed579fa43b6109656d46bc194fe01535a26370545f3fdf02d1d338fd8

    • SSDEEP

      12288:DgkDxdkL+6JNgKVcRa+fpHyWs3OBH4pUGACR:/xsKXa+hHyWseBgQCR

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks