General

  • Target

    FinalMom.exe

  • Size

    270KB

  • Sample

    240725-zgvx1awgrh

  • MD5

    4c048896f61c1fc598c9ec70adf6ee08

  • SHA1

    fb5468fe0894a4a7728b1a388bc08963cc760118

  • SHA256

    f213b6d73b6a7b3d90f4097e69689fa88fffe327690801ffb6992d659b981bf2

  • SHA512

    33652027fe457dd967dad1367510db1fd0eede4415dd86b64aea9d77425e7e061b60577811e4c5e79a6cf17cba33faa52c1780934079ed527efeb7846b1dc75c

  • SSDEEP

    6144:LGLRsWlWysINHL87yCwQx4Jw99aKGz5UBBkvVv+Iz3D5vxju7llbb9EE4N8cUMsG:LGLdlHL8W/QWJwiKluNmudUl99EE4N88

Malware Config

Targets

    • Target

      FinalMom.exe

    • Size

      270KB

    • MD5

      4c048896f61c1fc598c9ec70adf6ee08

    • SHA1

      fb5468fe0894a4a7728b1a388bc08963cc760118

    • SHA256

      f213b6d73b6a7b3d90f4097e69689fa88fffe327690801ffb6992d659b981bf2

    • SHA512

      33652027fe457dd967dad1367510db1fd0eede4415dd86b64aea9d77425e7e061b60577811e4c5e79a6cf17cba33faa52c1780934079ed527efeb7846b1dc75c

    • SSDEEP

      6144:LGLRsWlWysINHL87yCwQx4Jw99aKGz5UBBkvVv+Iz3D5vxju7llbb9EE4N8cUMsG:LGLdlHL8W/QWJwiKluNmudUl99EE4N88

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Indicator Removal: Clear Persistence

      Clear artifacts associated with previously established persistence like scheduletasks on a host.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks