General

  • Target

    nayuka

  • Size

    11KB

  • Sample

    240430-rl5n1aae63

  • MD5

    590fc016ccd46b4eecadb75f90960fcd

  • SHA1

    b2904ccb6ab5cad0c7e71f649b931f38ea4797c5

  • SHA256

    fc7309880e86d6a173d6fc8f16ee23ab64470d87730b9db762c239a600cb5c8e

  • SHA512

    ad63af90a0eeee63c03675ed92714842cd087c422fdbe3d3d0e85d6562394599b665e7c413529c34a790d6b6c64a591f56af40e855fd65aa8dc31b52aaaa3a14

  • SSDEEP

    192:FKlKHKpsvzpRr8n/lu39WLyi0yThrHSCw:lVRI/luNiyi0OhrHSt

Malware Config

Targets

    • Target

      nayuka

    • Size

      11KB

    • MD5

      590fc016ccd46b4eecadb75f90960fcd

    • SHA1

      b2904ccb6ab5cad0c7e71f649b931f38ea4797c5

    • SHA256

      fc7309880e86d6a173d6fc8f16ee23ab64470d87730b9db762c239a600cb5c8e

    • SHA512

      ad63af90a0eeee63c03675ed92714842cd087c422fdbe3d3d0e85d6562394599b665e7c413529c34a790d6b6c64a591f56af40e855fd65aa8dc31b52aaaa3a14

    • SSDEEP

      192:FKlKHKpsvzpRr8n/lu39WLyi0yThrHSCw:lVRI/luNiyi0OhrHSt

    • Modifies WinLogon for persistence

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Modifies system executable filetype association

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

6
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

File and Directory Permissions Modification

1
T1222

Discovery

Query Registry

5
T1012

System Information Discovery

5
T1082

Command and Control

Web Service

1
T1102

Tasks