General
-
Target
b571cd68c97f16598cd6a75f9c68e471
-
Size
644KB
-
Sample
240305-xqvmgsee41
-
MD5
b571cd68c97f16598cd6a75f9c68e471
-
SHA1
e9140a31d28af6033dd9e58f73b2e1891dafda6d
-
SHA256
dc1b07a52af475827944cf1bdd0c8468fe428e5cece300227ca3c54ebc5e3e65
-
SHA512
3b348101ca228acb557dc851d4192ea71aad03fc50298e494c464148b8a4170724e297381b92d4f1a6f5d2ad1a9712ba4b7175986e4d965bc6ce46e9119ce53b
-
SSDEEP
12288:PKr3QboC9qLGKgZKe4HYpHvcbTUT+tLEGz//:PQ3QbiGL8LwH18
Static task
static1
Behavioral task
behavioral1
Sample
b571cd68c97f16598cd6a75f9c68e471.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b571cd68c97f16598cd6a75f9c68e471.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
b571cd68c97f16598cd6a75f9c68e471
-
Size
644KB
-
MD5
b571cd68c97f16598cd6a75f9c68e471
-
SHA1
e9140a31d28af6033dd9e58f73b2e1891dafda6d
-
SHA256
dc1b07a52af475827944cf1bdd0c8468fe428e5cece300227ca3c54ebc5e3e65
-
SHA512
3b348101ca228acb557dc851d4192ea71aad03fc50298e494c464148b8a4170724e297381b92d4f1a6f5d2ad1a9712ba4b7175986e4d965bc6ce46e9119ce53b
-
SSDEEP
12288:PKr3QboC9qLGKgZKe4HYpHvcbTUT+tLEGz//:PQ3QbiGL8LwH18
Score10/10-
Modifies WinLogon for persistence
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1