General

  • Target

    ef1b2684cf97e3fec89fa26c24d267a8b556edf05e9b1f7612753dda965adc93

  • Size

    632KB

  • Sample

    240329-cdzqfsef7w

  • MD5

    3acc122e04bad00696bba1020a9be409

  • SHA1

    f56e588ebc9b1bc97eeb71003041e2aac0ed8bd1

  • SHA256

    ef1b2684cf97e3fec89fa26c24d267a8b556edf05e9b1f7612753dda965adc93

  • SHA512

    51e88604d90c94620d2f681ad47a9ea5f475862eec180a1c77dccc36c08c937d81f959b96c6a6513a261f93031cfd571d5a99e2734c8c86f03f3de9d556dc34f

  • SSDEEP

    12288:q/iSuokQiMXBLfzYjnlJE1xl444clzKbtDf4TclbwO0dJYPjfWrhrn:q/iUbVKnHEva4plzKxT4TclEO0yjM7

Malware Config

Targets

    • Target

      ef1b2684cf97e3fec89fa26c24d267a8b556edf05e9b1f7612753dda965adc93

    • Size

      632KB

    • MD5

      3acc122e04bad00696bba1020a9be409

    • SHA1

      f56e588ebc9b1bc97eeb71003041e2aac0ed8bd1

    • SHA256

      ef1b2684cf97e3fec89fa26c24d267a8b556edf05e9b1f7612753dda965adc93

    • SHA512

      51e88604d90c94620d2f681ad47a9ea5f475862eec180a1c77dccc36c08c937d81f959b96c6a6513a261f93031cfd571d5a99e2734c8c86f03f3de9d556dc34f

    • SSDEEP

      12288:q/iSuokQiMXBLfzYjnlJE1xl444clzKbtDf4TclbwO0dJYPjfWrhrn:q/iUbVKnHEva4plzKxT4TclEO0yjM7

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Registers COM server for autorun

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks