General

  • Target

    47074dbd10aafc67df34adefac3d0fc0N.exe

  • Size

    4.7MB

  • Sample

    240724-emf1tazgmg

  • MD5

    47074dbd10aafc67df34adefac3d0fc0

  • SHA1

    143477766ae66727e311d4d0197803232ccac240

  • SHA256

    86f5405f75eb6d9690e453a33e7a3fe295f14768a6d74ded401e9b5be20187f9

  • SHA512

    bab199ef6f6f79de1e402eaa9a9f0b621b75a49e8e0136d63f441ab6a06633acb902b21d0cc3708d93537036d58b7ca900eff5c8951f5629e36a78569a3818c8

  • SSDEEP

    98304:1H5MPEcnPLf8rQp551zx0w38HSbUbBpkI9Aq0K2TLs4:1H2/+Qp5jNREyIt0NTY4

Malware Config

Targets

    • Target

      47074dbd10aafc67df34adefac3d0fc0N.exe

    • Size

      4.7MB

    • MD5

      47074dbd10aafc67df34adefac3d0fc0

    • SHA1

      143477766ae66727e311d4d0197803232ccac240

    • SHA256

      86f5405f75eb6d9690e453a33e7a3fe295f14768a6d74ded401e9b5be20187f9

    • SHA512

      bab199ef6f6f79de1e402eaa9a9f0b621b75a49e8e0136d63f441ab6a06633acb902b21d0cc3708d93537036d58b7ca900eff5c8951f5629e36a78569a3818c8

    • SSDEEP

      98304:1H5MPEcnPLf8rQp551zx0w38HSbUbBpkI9Aq0K2TLs4:1H2/+Qp5jNREyIt0NTY4

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Sets service image path in registry

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks