General

  • Target

    Aprhdotite_Aim_Assist_Enchancing (1).bat

  • Size

    58KB

  • Sample

    240624-v1bw1sxcjm

  • MD5

    83700e3f4f7bd388da587b56b382f9d5

  • SHA1

    f4b00d5f2f8d0e95d18da88102d330d44dda24e0

  • SHA256

    1c43aa5997daaf921e52a5adb50d7f1bd11062c3c97e425129a297394502965e

  • SHA512

    2e3f573a0dc86923ee78e85300b0316dc6fbcc2f4a9fb2991b1c3fb7f4cc51b74613ef8d3ba0429233f0a60803dacc3f7d4f087de164b6105913cd4e811dca50

  • SSDEEP

    1536:dZZCvQEh1zCwdTCKyQah1zCwApIIqWz0KL:xIfz0E

Malware Config

Targets

    • Target

      Aprhdotite_Aim_Assist_Enchancing (1).bat

    • Size

      58KB

    • MD5

      83700e3f4f7bd388da587b56b382f9d5

    • SHA1

      f4b00d5f2f8d0e95d18da88102d330d44dda24e0

    • SHA256

      1c43aa5997daaf921e52a5adb50d7f1bd11062c3c97e425129a297394502965e

    • SHA512

      2e3f573a0dc86923ee78e85300b0316dc6fbcc2f4a9fb2991b1c3fb7f4cc51b74613ef8d3ba0429233f0a60803dacc3f7d4f087de164b6105913cd4e811dca50

    • SSDEEP

      1536:dZZCvQEh1zCwdTCKyQah1zCwApIIqWz0KL:xIfz0E

    • Modifies Windows Defender Real-time Protection settings

    • Modifies firewall policy service

    • UAC bypass

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks