General

  • Target

    e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16

  • Size

    223KB

  • Sample

    240522-lxedasbc5s

  • MD5

    3955af54fbac1e43c945f447d92e4108

  • SHA1

    53c5552c3649619e4e8c6a907b94573f47130fa4

  • SHA256

    e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16

  • SHA512

    fa028a040a5f075296aebab7f63a59b6cbba32ee0964dfc08768396cc012ff5d861191e2478914d79d4a424c3bba110505a58b97376c44c716f0b1ea70551037

  • SSDEEP

    3072:tneBqhy5aVLOwqI8sgwoEHXfwaNUM+/ORSs5G2Ms4f6TFZbhgvbUxzJ8Y:tETlsgOfDt+/V6JQO98

Malware Config

Targets

    • Target

      e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16

    • Size

      223KB

    • MD5

      3955af54fbac1e43c945f447d92e4108

    • SHA1

      53c5552c3649619e4e8c6a907b94573f47130fa4

    • SHA256

      e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16

    • SHA512

      fa028a040a5f075296aebab7f63a59b6cbba32ee0964dfc08768396cc012ff5d861191e2478914d79d4a424c3bba110505a58b97376c44c716f0b1ea70551037

    • SSDEEP

      3072:tneBqhy5aVLOwqI8sgwoEHXfwaNUM+/ORSs5G2Ms4f6TFZbhgvbUxzJ8Y:tETlsgOfDt+/V6JQO98

    • Creates new service(s)

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

System Services

1
T1569

Service Execution

1
T1569.002

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

File and Directory Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Tasks