General

  • Target

    6ff8d5f8850a7e3cb44953f1a78a292a4b354d1b1c805cce55279fc6d908ec9b

  • Size

    981KB

  • Sample

    240314-zc6tpsgf29

  • MD5

    b8a9491233cac3a3636821da151329d2

  • SHA1

    7686d860ad1e60378a93054c33514771f67286c0

  • SHA256

    6ff8d5f8850a7e3cb44953f1a78a292a4b354d1b1c805cce55279fc6d908ec9b

  • SHA512

    973ee75db9ef72fa9a5073b2b336840247ecdfb00fcc201f821b645c6a5021c246f39897e6a807d56b1d4e725c9ecce877ac22628ee91482616ec315fe843010

  • SSDEEP

    12288:RnWwvHpVmXpjJIUd2DUusvalxPnWwvHpVmXpjJIUd2cUmsvalxR:9WTpjJI82IpWxPWTpjJI827xWxR

Score
10/10

Malware Config

Targets

    • Target

      6ff8d5f8850a7e3cb44953f1a78a292a4b354d1b1c805cce55279fc6d908ec9b

    • Size

      981KB

    • MD5

      b8a9491233cac3a3636821da151329d2

    • SHA1

      7686d860ad1e60378a93054c33514771f67286c0

    • SHA256

      6ff8d5f8850a7e3cb44953f1a78a292a4b354d1b1c805cce55279fc6d908ec9b

    • SHA512

      973ee75db9ef72fa9a5073b2b336840247ecdfb00fcc201f821b645c6a5021c246f39897e6a807d56b1d4e725c9ecce877ac22628ee91482616ec315fe843010

    • SSDEEP

      12288:RnWwvHpVmXpjJIUd2DUusvalxPnWwvHpVmXpjJIUd2cUmsvalxR:9WTpjJI82IpWxPWTpjJI827xWxR

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Disables use of System Restore points

    • Sets file execution options in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks