General

  • Target

    c40352658eaf2a5b665918fa4b6e8ab2

  • Size

    263KB

  • Sample

    240312-wpqfpshf88

  • MD5

    c40352658eaf2a5b665918fa4b6e8ab2

  • SHA1

    1dc9ed67d61563132ea01a8c8546691adf5922c4

  • SHA256

    6b82877273d33819a363afe193e4fdd4c0798c3192933ada6ade9ca0d1523e3d

  • SHA512

    de34f05fcc9c6ca2065a7a62bce1a99ec0a052d98c7dfd01d13db341b9688908e0fd2493451483d263dc0d6759be2f83c144875dd9dc02499170073fb7e24572

  • SSDEEP

    6144:JdMITlD2SOe05HFNSwrE4jdfWNJAhOUUxp:JdtTlD2SOZVFAwvjtWbUUP

Malware Config

Targets

    • Target

      c40352658eaf2a5b665918fa4b6e8ab2

    • Size

      263KB

    • MD5

      c40352658eaf2a5b665918fa4b6e8ab2

    • SHA1

      1dc9ed67d61563132ea01a8c8546691adf5922c4

    • SHA256

      6b82877273d33819a363afe193e4fdd4c0798c3192933ada6ade9ca0d1523e3d

    • SHA512

      de34f05fcc9c6ca2065a7a62bce1a99ec0a052d98c7dfd01d13db341b9688908e0fd2493451483d263dc0d6759be2f83c144875dd9dc02499170073fb7e24572

    • SSDEEP

      6144:JdMITlD2SOe05HFNSwrE4jdfWNJAhOUUxp:JdtTlD2SOZVFAwvjtWbUUP

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks