General

  • Target

    7e0244a8bc506ac34c494c55c52a03b5

  • Size

    2.1MB

  • Sample

    240128-zy939aaca5

  • MD5

    7e0244a8bc506ac34c494c55c52a03b5

  • SHA1

    60552dff2005084e18aa148ea1e865f5580d067d

  • SHA256

    40d8d89e6aa8a95ed370d23588de5bf3601c650334986d8a222e4582be7c4ef5

  • SHA512

    6cecdec9ed0dca6714e299be18043e932e5ed9a25c5018af56f5f7823a1ec46a50a735f933236fe6d70bc338effe5896daf838f8594559ebb02c4d0e9c81e45a

  • SSDEEP

    49152:51vqjd/Qvq/AvCGVIBzES3kJy7qE6kDHfZ5:51vqjskOi0JUB5

Score
10/10

Malware Config

Targets

    • Target

      7e0244a8bc506ac34c494c55c52a03b5

    • Size

      2.1MB

    • MD5

      7e0244a8bc506ac34c494c55c52a03b5

    • SHA1

      60552dff2005084e18aa148ea1e865f5580d067d

    • SHA256

      40d8d89e6aa8a95ed370d23588de5bf3601c650334986d8a222e4582be7c4ef5

    • SHA512

      6cecdec9ed0dca6714e299be18043e932e5ed9a25c5018af56f5f7823a1ec46a50a735f933236fe6d70bc338effe5896daf838f8594559ebb02c4d0e9c81e45a

    • SSDEEP

      49152:51vqjd/Qvq/AvCGVIBzES3kJy7qE6kDHfZ5:51vqjskOi0JUB5

    Score
    10/10
    • Modifies firewall policy service

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks