General

  • Target

    6491f86e427e5a7b8a5e6fb473ab9fcf

  • Size

    181KB

  • Sample

    240118-fzr5aaeab3

  • MD5

    6491f86e427e5a7b8a5e6fb473ab9fcf

  • SHA1

    e9dbcd8793f8475595bf679638f11fa11be0ce76

  • SHA256

    fc9c7441fbea016a309829468e9ebbe1ec69a9a5db92bbb67e951cde478befbf

  • SHA512

    5ef61129f69711d86a7538437cd65af7d97175d0724322f459ed206a12adee77a23078e68ec996667981524fe33d00deac44856ee45db74756512ead8081d943

  • SSDEEP

    3072:qCbdrXuHPiM80BfqCGGQZiN4h1R1qwzZtvL4L+mB6LI2FDD0VzOKsmu7WWV7tr8:qCbNXuaM80Bfb6ioTgwzjvLccDwOMu7Q

Malware Config

Targets

    • Target

      222.exe

    • Size

      190KB

    • MD5

      2a7aecf54b3737624d09fd139792661d

    • SHA1

      d51fdc573c5ed271b37037906db7d05b3ec3f65e

    • SHA256

      f8180403ff508bfeebd548e6b27870490dbc97df71ed316cd56f103dd67c6a7f

    • SHA512

      12567fcc11b5ccc5ecfce4e809e2d759a256415e2f41f3b45325becf2bfd2d1e3cedf163724984fbcac9912b83d9b103b4fbd5fecfbae50c2b35aa807ad9a0f2

    • SSDEEP

      3072:K2wWV8Y+7BfZpvT5LElbnpSi0VaVgkL9dB0diHg+3VMRfWEA8vnQdQopt:RwbXBfZBlL2pSizVJBdB0wA+2Rfm8oK2

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables use of System Restore points

    • Sets file execution options in registry

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Windows security modification

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks