General

  • Target

    3827953289572398579235.mp4..exe

  • Size

    32KB

  • Sample

    240221-c3mgeshh6x

  • MD5

    4bc37d2f324907590321dcef8f5a1320

  • SHA1

    29b1973dbced366b91251b351e274fd996e8ade8

  • SHA256

    167d09acdc1b0bf9b7608dbe92acfe4f6893445881727d32624b3548e76958e4

  • SHA512

    b8e97180f7d00bad17054021a48444c93fb64429e43243296c8d425bb382bae74514255cd626d924d894a05093034e6818f36ba20361fb6ed19d5f17d553eed8

  • SSDEEP

    384:gV9bnHZbB1TpYJHMlZb/11xUjddIWm8FqXcfLc5IxmyO5RrzOm8asZTzzt1SEobr:gXTBpf/zxZWml6CelLJykJTu7

Malware Config

Targets

    • Target

      3827953289572398579235.mp4..exe

    • Size

      32KB

    • MD5

      4bc37d2f324907590321dcef8f5a1320

    • SHA1

      29b1973dbced366b91251b351e274fd996e8ade8

    • SHA256

      167d09acdc1b0bf9b7608dbe92acfe4f6893445881727d32624b3548e76958e4

    • SHA512

      b8e97180f7d00bad17054021a48444c93fb64429e43243296c8d425bb382bae74514255cd626d924d894a05093034e6818f36ba20361fb6ed19d5f17d553eed8

    • SSDEEP

      384:gV9bnHZbB1TpYJHMlZb/11xUjddIWm8FqXcfLc5IxmyO5RrzOm8asZTzzt1SEobr:gXTBpf/zxZWml6CelLJykJTu7

    • UAC bypass

    • Blocklisted process makes network request

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks