General
-
Target
Client.exe
-
Size
152KB
-
Sample
240124-qhdwfabbcj
-
MD5
4eca25e5d48e5a2545d3338b1917cb63
-
SHA1
a1bf9a31f79d361cd4868bdc416093d3c4e1c395
-
SHA256
734b51174ef82cd21c44faeca68824b3aa688d3173d7e55e61895efb3119d58f
-
SHA512
7f4e5d8e54c9137d4f4c8074fa89488891f1cd5049be42a0f4ae3edd9eb653c68e29a15f3ebd03aaca531978b5697eb3a1bb8fde460d98a874eac2b9332620b2
-
SSDEEP
3072:Lt58/dhceTZZw53OK8fSCJTXDErgzEsGbURCSijVyWb1JGYQ:4d68ZwoLfNJTXDEWGbUsjJbp
Static task
static1
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
Client.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
Client.exe
-
Size
152KB
-
MD5
4eca25e5d48e5a2545d3338b1917cb63
-
SHA1
a1bf9a31f79d361cd4868bdc416093d3c4e1c395
-
SHA256
734b51174ef82cd21c44faeca68824b3aa688d3173d7e55e61895efb3119d58f
-
SHA512
7f4e5d8e54c9137d4f4c8074fa89488891f1cd5049be42a0f4ae3edd9eb653c68e29a15f3ebd03aaca531978b5697eb3a1bb8fde460d98a874eac2b9332620b2
-
SSDEEP
3072:Lt58/dhceTZZw53OK8fSCJTXDErgzEsGbURCSijVyWb1JGYQ:4d68ZwoLfNJTXDEWGbUsjJbp
Score10/10-
Modifies WinLogon for persistence
-
Async RAT payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2