Resubmissions

23-02-2024 09:31

240223-lhgvwaeg22 10

21-02-2024 04:14

240221-etyjfabc8x 10

General

  • Target

    eb76472cb7a072bbfb59918ef1594ca866fbd9884b2776cb5e427dcec2d3b13e.exe

  • Size

    43KB

  • Sample

    240221-etyjfabc8x

  • MD5

    ed3326070afd94f87cdaf84b73e6e9ef

  • SHA1

    672a4894dbfccee529479f48b72a5d9387bf4e80

  • SHA256

    eb76472cb7a072bbfb59918ef1594ca866fbd9884b2776cb5e427dcec2d3b13e

  • SHA512

    e50daaa2e312bf1f58aa75009b963570f8bb7839606a05a344cebaa28485789804f3014f7bbbe56f96a89fb148a1dc8a5adb70a1fea5ab7f2bcabd10a6b24948

  • SSDEEP

    768:+zQLbMYi+I2XsS35xRGUZjsosoTwoM1LmelYdX/1QXcmYZllsXEFiRNi:+zQEYiZ2cS35xRGUaosoMoM17lY91QMb

Malware Config

Targets

    • Target

      eb76472cb7a072bbfb59918ef1594ca866fbd9884b2776cb5e427dcec2d3b13e.exe

    • Size

      43KB

    • MD5

      ed3326070afd94f87cdaf84b73e6e9ef

    • SHA1

      672a4894dbfccee529479f48b72a5d9387bf4e80

    • SHA256

      eb76472cb7a072bbfb59918ef1594ca866fbd9884b2776cb5e427dcec2d3b13e

    • SHA512

      e50daaa2e312bf1f58aa75009b963570f8bb7839606a05a344cebaa28485789804f3014f7bbbe56f96a89fb148a1dc8a5adb70a1fea5ab7f2bcabd10a6b24948

    • SSDEEP

      768:+zQLbMYi+I2XsS35xRGUZjsosoTwoM1LmelYdX/1QXcmYZllsXEFiRNi:+zQEYiZ2cS35xRGUaosoMoM17lY91QMb

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • UAC bypass

    • Windows security bypass

    • Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects executables containing artifacts associated with disabling Widnows Defender

    • Detects executables embedding command execution via IExecuteCommand COM object

    • Detects executables potentially checking for WinJail sandbox window

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks