General

  • Target

    MalwareBazaar.2

  • Size

    1.3MB

  • Sample

    240711-m42ylswcqa

  • MD5

    ccc431f7f61f9aeec3cab9f01352214e

  • SHA1

    11d0637469bafcdca12f5591457f2c5e4ca1af56

  • SHA256

    466a54d0b40dae3da963f52da4b2e993deca81ee39a2bb4b6d41582e5feff5e3

  • SHA512

    e57c280f57b5aa72362b502c963179470efd6114ac5ee52cff59cc8cca83e5d453e27e55e2495e00ce2549b322dad2920cb75e13edd43fa35033ea2f9813b6a9

  • SSDEEP

    12288:HNLn2J8+XJ3HPoYo07jsMZa3EOAqC7WT0ltDQFSbBL1uccKslJy:tLnsZAz0vZ9hw0ffZqlJy

Malware Config

Targets

    • Target

      MalwareBazaar.2

    • Size

      1.3MB

    • MD5

      ccc431f7f61f9aeec3cab9f01352214e

    • SHA1

      11d0637469bafcdca12f5591457f2c5e4ca1af56

    • SHA256

      466a54d0b40dae3da963f52da4b2e993deca81ee39a2bb4b6d41582e5feff5e3

    • SHA512

      e57c280f57b5aa72362b502c963179470efd6114ac5ee52cff59cc8cca83e5d453e27e55e2495e00ce2549b322dad2920cb75e13edd43fa35033ea2f9813b6a9

    • SSDEEP

      12288:HNLn2J8+XJ3HPoYo07jsMZa3EOAqC7WT0ltDQFSbBL1uccKslJy:tLnsZAz0vZ9hw0ffZqlJy

    • UAC bypass

    • Windows security bypass

    • Adds policy Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks