General
-
Target
4d82679e58ebb79116a82dade9fe359fe72c348780dd8a6cfdc3469fe6a49c50.bin.zip
-
Size
5.7MB
-
Sample
240102-rhz94sabb3
-
MD5
3033f568e9522db2a02e528fe3da32f2
-
SHA1
3fdd513e48f431854010a9f18761ab0cd4d0747e
-
SHA256
b9919c0c512281f0af99d6dc34bf55d6d6e6faab040e5db2b0dcc0702b0f7b3b
-
SHA512
3f022e72f1be57a0765498b2ddcf46d3fee6f3b1b14c3f082dcac63279da6d44820f38c79800536e45afd2116e6068ae01a769c17a61be78e94ef013c5aa0b11
-
SSDEEP
98304:3QTyzC740k6WETeH04RCZ8Xv3QJSk7qvlHPcXsitH3JKGOaQ66kBR9KmGhAViP2:3QJ40hWNU40Z8f34W5PfiIaP6kBWmGWz
Static task
static1
Behavioral task
behavioral1
Sample
4d82679e58ebb79116a82dade9fe359fe72c348780dd8a6cfdc3469fe6a49c50.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d82679e58ebb79116a82dade9fe359fe72c348780dd8a6cfdc3469fe6a49c50.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
4d82679e58ebb79116a82dade9fe359fe72c348780dd8a6cfdc3469fe6a49c50.bin
-
Size
6.2MB
-
MD5
c92c59fa1503d65d1d67a578928e3c55
-
SHA1
0cb1106bde45dd5be118bb7b9ebb2be3e41b7203
-
SHA256
4d82679e58ebb79116a82dade9fe359fe72c348780dd8a6cfdc3469fe6a49c50
-
SHA512
1f8c714bfc23bd642ec6f4e5539ac1585e0cd8a54ba2b72ff06d7b4f0dd94589a8e6ab41b689f11f51425067784e071eeffc7e803470d55793492d38f6d11241
-
SSDEEP
196608:CIgAn6JaxBEvXUJyXEJDNfZJoExr77dZWoNMUyr:SA6YxBYXY+sJokFZWdUy
Score10/10-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Sets DLL path for service in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies WinLogon
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1