General

  • Target

    03082024_0116_02082024_LISTA DE ORDENES DE COMPRA__PDF.7z

  • Size

    638KB

  • Sample

    240803-bmxrsayakm

  • MD5

    807192b62e13fec2a74fdbd69de041cb

  • SHA1

    fcbf0d628fae7c3e6ace884a4153d261b2613633

  • SHA256

    0a3e4954b4046621f08d58d979f486025eafdac0ffe034325c1991f7341409b5

  • SHA512

    0d7472a239b40b524d4a9d9ac62ddc6242f44e64853ab2aef292e3683073404655f360e8c2b8adb6e8a2482856a4e92868c02dc66e7859bd07f1ebd7e2bde1bc

  • SSDEEP

    12288:EkgGXKN+4bcfxlMyLKDgBHRIXaJBf38hFSbRtpHwiibbdUPYkFEfNPwZJt:4OI+4bcplYkRW+t+Q9tpHwiinaEfNIbt

Malware Config

Targets

    • Target

      LISTA DE ORDENES DE COMPRA__PDF/LISTA DE ORDENES DE COMPRA__PDF.exe

    • Size

      1.4MB

    • MD5

      8d64ff3266837b9743e9b5c27b6430c4

    • SHA1

      435f4ab16f229b2d310c3b993399a736519a71d0

    • SHA256

      1a5bf080bce35a5ce143be2f29c5ccb0045ccaeab67068afa9e095bd536ddedd

    • SHA512

      1b9e5b6e59542625f48b746649fb768d6ded3bfd87cc0f015e645a21ca6a342b205a21ff84a1103e1a38d39ea07ec433636dd17f7f1866ad2992baeaacad0bc9

    • SSDEEP

      12288:sTlurxBjBzDBlYZpT7dBDz+jWHHyJUZ1QBHL1hX52gihYWLSnxsu:DTBBgl7dB/+vr1f2gihS5

    • UAC bypass

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks