General

  • Target

    bb80f439f27756b1c64ddb4d95fac26d8f95fc8bc4c342978f5fa4fe28f728b8

  • Size

    130KB

  • Sample

    240605-cywvasbf9z

  • MD5

    cacd94b1f29d9844e89f442c468dd066

  • SHA1

    bbc6fb9afe7c7e21cbe7064cf056720bd5bed798

  • SHA256

    bb80f439f27756b1c64ddb4d95fac26d8f95fc8bc4c342978f5fa4fe28f728b8

  • SHA512

    f1cb05b1d8be1f3b234bdcd1e8a0a6207c40f05c9ef8f172345567a76d34cb81616ef89b135a8d50188090c9b33dacd948974e689e09eceee98acc7b61e90ab1

  • SSDEEP

    3072:dGfAUbd5CR4Up+UPO0ksS7KoD1f2CfUpHzk2r0Z:K1b/UJO0m7Ko5fvfo3+

Score
10/10

Malware Config

Targets

    • Target

      bb80f439f27756b1c64ddb4d95fac26d8f95fc8bc4c342978f5fa4fe28f728b8

    • Size

      130KB

    • MD5

      cacd94b1f29d9844e89f442c468dd066

    • SHA1

      bbc6fb9afe7c7e21cbe7064cf056720bd5bed798

    • SHA256

      bb80f439f27756b1c64ddb4d95fac26d8f95fc8bc4c342978f5fa4fe28f728b8

    • SHA512

      f1cb05b1d8be1f3b234bdcd1e8a0a6207c40f05c9ef8f172345567a76d34cb81616ef89b135a8d50188090c9b33dacd948974e689e09eceee98acc7b61e90ab1

    • SSDEEP

      3072:dGfAUbd5CR4Up+UPO0ksS7KoD1f2CfUpHzk2r0Z:K1b/UJO0m7Ko5fvfo3+

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Detects executables built or packed with MPress PE compressor

    • UPX dump on OEP (original entry point)

    • Disables use of System Restore points

    • Sets file execution options in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks