General

  • Target

    remote.exe

  • Size

    109.6MB

  • Sample

    240408-v7zawsac7y

  • MD5

    9ed2ecc69a8d28180ea9b09aca9cc52c

  • SHA1

    a76ae731b77c851b570a495d5ef4038642786831

  • SHA256

    bea35dfc4b1202c07ba712822e10f69de68c84ee535f376bf7e31601661d668a

  • SHA512

    9c389cf86da4c2b304d9f3a964107a3d9e4999735e3d6b8c004ca986858f91a9213851ed855c6bec5f7b5c539afef74694e6f32c5b51f63f357ace538b4bdfaa

  • SSDEEP

    1572864:LOwVocpvoNevC2BbuJHGO4sD6592vTvIPQssYZ9Dct8B6MCuTWIZpumprpbsyeqw:FX9otcbuJDc2QYssYr+q6M5Tzl4eWV

Score
8/10

Malware Config

Targets

    • Target

      remote.exe

    • Size

      109.6MB

    • MD5

      9ed2ecc69a8d28180ea9b09aca9cc52c

    • SHA1

      a76ae731b77c851b570a495d5ef4038642786831

    • SHA256

      bea35dfc4b1202c07ba712822e10f69de68c84ee535f376bf7e31601661d668a

    • SHA512

      9c389cf86da4c2b304d9f3a964107a3d9e4999735e3d6b8c004ca986858f91a9213851ed855c6bec5f7b5c539afef74694e6f32c5b51f63f357ace538b4bdfaa

    • SSDEEP

      1572864:LOwVocpvoNevC2BbuJHGO4sD6592vTvIPQssYZ9Dct8B6MCuTWIZpumprpbsyeqw:FX9otcbuJDc2QYssYr+q6M5Tzl4eWV

    Score
    8/10
    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks