General

  • Target

    87633eb6eeb7edd72ded8e33ef0c2920

  • Size

    124KB

  • Sample

    240201-t9ehtsccfm

  • MD5

    87633eb6eeb7edd72ded8e33ef0c2920

  • SHA1

    ec1e166039a14fedb584f04a50bca85af36f00fb

  • SHA256

    1c896bcb561ed46a1b63bb55acdb1249d0f1151b415b54d57ece2a1a37ad712d

  • SHA512

    3fd660edc3dd66780050e751fc830262c1adaa61611ee799927b427c595c0ce5f96f6a893669a2bd18c8652e0870deabda5e14968c91395e34e18de059ad78cc

  • SSDEEP

    3072:GlhkajfwqM9F1DDmMtSNV5PuqLJsoUm9IYcsF+LnJ5d7q+:GXkajovDmMtSNVNSm9JinrV

Malware Config

Targets

    • Target

      87633eb6eeb7edd72ded8e33ef0c2920

    • Size

      124KB

    • MD5

      87633eb6eeb7edd72ded8e33ef0c2920

    • SHA1

      ec1e166039a14fedb584f04a50bca85af36f00fb

    • SHA256

      1c896bcb561ed46a1b63bb55acdb1249d0f1151b415b54d57ece2a1a37ad712d

    • SHA512

      3fd660edc3dd66780050e751fc830262c1adaa61611ee799927b427c595c0ce5f96f6a893669a2bd18c8652e0870deabda5e14968c91395e34e18de059ad78cc

    • SSDEEP

      3072:GlhkajfwqM9F1DDmMtSNV5PuqLJsoUm9IYcsF+LnJ5d7q+:GXkajovDmMtSNVNSm9JinrV

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks