General

  • Target

    093301945a8f345e8ed344da9a3a89ec0c1a58bb35682a60edf0e6c124a8d80b

  • Size

    457KB

  • Sample

    240516-w5jyvsaa9s

  • MD5

    1b323edd84a00af4592a3b45c397ab75

  • SHA1

    9d2df0600050917f4c265a464692fb709819e75b

  • SHA256

    093301945a8f345e8ed344da9a3a89ec0c1a58bb35682a60edf0e6c124a8d80b

  • SHA512

    2a1919346e864fdda362b7861438f70ff99c848aba8e2cd79ac5f6b8dc9fdf73cd7118aa352b32eeef396c63671de82b6fb8b9fa20de71715d5863abe60d581a

  • SSDEEP

    6144:FY+32WWluqvHpVmXWEjFJRWci+WUd20rUU5EYCTvaBju4zR:SnWwvHpVmXpjJIUd2cUusvalxzR

Score
10/10

Malware Config

Targets

    • Target

      093301945a8f345e8ed344da9a3a89ec0c1a58bb35682a60edf0e6c124a8d80b

    • Size

      457KB

    • MD5

      1b323edd84a00af4592a3b45c397ab75

    • SHA1

      9d2df0600050917f4c265a464692fb709819e75b

    • SHA256

      093301945a8f345e8ed344da9a3a89ec0c1a58bb35682a60edf0e6c124a8d80b

    • SHA512

      2a1919346e864fdda362b7861438f70ff99c848aba8e2cd79ac5f6b8dc9fdf73cd7118aa352b32eeef396c63671de82b6fb8b9fa20de71715d5863abe60d581a

    • SSDEEP

      6144:FY+32WWluqvHpVmXWEjFJRWci+WUd20rUU5EYCTvaBju4zR:SnWwvHpVmXpjJIUd2cUusvalxzR

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Detects executables built or packed with MPress PE compressor

    • UPX dump on OEP (original entry point)

    • Disables use of System Restore points

    • Sets file execution options in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks