General

  • Target

    32d6d189bd411aeb36f376cb2129091acf0d023f29e532d14a67a3bb6e275ae8

  • Size

    510KB

  • Sample

    240323-xycrmsdf9y

  • MD5

    61d54232427a9d24ad63d5cfe7f236af

  • SHA1

    6c6fae95bba7cb51db8a8d197d066c268c809b39

  • SHA256

    32d6d189bd411aeb36f376cb2129091acf0d023f29e532d14a67a3bb6e275ae8

  • SHA512

    fc3475e0604a383667e390610565051d34b4d6721460161d3837f37e17cd6c4538027d841b46a6f097bdd7067d45b51674b76581ddc4c8b2eff18cee0a446a64

  • SSDEEP

    6144:TL+rqBloJJn3VvK6WrIbSBuBbS4bS7/B+0eUdo6Eo7Y8EClATJXbSOrMhja93Gbi:TLySlYJZK6WrCNjqZOvqECoJLBkaaOf

Malware Config

Targets

    • Target

      32d6d189bd411aeb36f376cb2129091acf0d023f29e532d14a67a3bb6e275ae8

    • Size

      510KB

    • MD5

      61d54232427a9d24ad63d5cfe7f236af

    • SHA1

      6c6fae95bba7cb51db8a8d197d066c268c809b39

    • SHA256

      32d6d189bd411aeb36f376cb2129091acf0d023f29e532d14a67a3bb6e275ae8

    • SHA512

      fc3475e0604a383667e390610565051d34b4d6721460161d3837f37e17cd6c4538027d841b46a6f097bdd7067d45b51674b76581ddc4c8b2eff18cee0a446a64

    • SSDEEP

      6144:TL+rqBloJJn3VvK6WrIbSBuBbS4bS7/B+0eUdo6Eo7Y8EClATJXbSOrMhja93Gbi:TLySlYJZK6WrCNjqZOvqECoJLBkaaOf

    • Modifies WinLogon for persistence

    • UPX dump on OEP (original entry point)

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Modifies system executable filetype association

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Modifies WinLogon

MITRE ATT&CK Enterprise v15

Tasks