General
-
Target
2e11a107763e5114f853c569682a4d801a9cf3613702526ab5384fa107d42b59
-
Size
200KB
-
Sample
240619-ywwmeatfpn
-
MD5
ed911a5e84f389033d7fce33d1259d19
-
SHA1
451e8f641b08bf2b4c200a7cd25958c6e35a139e
-
SHA256
2e11a107763e5114f853c569682a4d801a9cf3613702526ab5384fa107d42b59
-
SHA512
94d6288d6071a75891b77a29492d4077848c616c70b70fd0e74b6b6032b23b03bb3a65ce507563ce503204dd20d3d6b687aae140b3919c3ba91df46d941b9f1d
-
SSDEEP
3072:o2EK86cjwLvASBLVVV2etw2TIrvygHuZ4LEMwQmBa6nn5xu0:8cL4SBLVVV252kbygu5pn/
Static task
static1
Behavioral task
behavioral1
Sample
2e11a107763e5114f853c569682a4d801a9cf3613702526ab5384fa107d42b59.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2e11a107763e5114f853c569682a4d801a9cf3613702526ab5384fa107d42b59.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2e11a107763e5114f853c569682a4d801a9cf3613702526ab5384fa107d42b59
-
Size
200KB
-
MD5
ed911a5e84f389033d7fce33d1259d19
-
SHA1
451e8f641b08bf2b4c200a7cd25958c6e35a139e
-
SHA256
2e11a107763e5114f853c569682a4d801a9cf3613702526ab5384fa107d42b59
-
SHA512
94d6288d6071a75891b77a29492d4077848c616c70b70fd0e74b6b6032b23b03bb3a65ce507563ce503204dd20d3d6b687aae140b3919c3ba91df46d941b9f1d
-
SSDEEP
3072:o2EK86cjwLvASBLVVV2etw2TIrvygHuZ4LEMwQmBa6nn5xu0:8cL4SBLVVV252kbygu5pn/
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1