General

  • Target

    37dabbe49da270a4867b67bcbdf26110N.exe

  • Size

    568KB

  • Sample

    240814-ss9f7szbmg

  • MD5

    37dabbe49da270a4867b67bcbdf26110

  • SHA1

    67ff7fe72202bd7df0addd19f1b771b19576222e

  • SHA256

    2b57890accb6a045723f3cc849ab93df9c35a4d68574387177b733bda715f0b9

  • SHA512

    386f25df7d1c1e2320c0ad5f69a0279a7e5c837e5378598ea99a2d05f410e4364e82c607aebae45da9fb9ba6f1b1510443be719fb5f4cfab9f7c8b8340238b89

  • SSDEEP

    12288:6pUJ3r6YkVwJgNnSykgb9cqWnw4q6ZmFhqsi7KaIr:6pUNr6YkVRFkgbeqeo68FhqT7KaIr

Malware Config

Targets

    • Target

      37dabbe49da270a4867b67bcbdf26110N.exe

    • Size

      568KB

    • MD5

      37dabbe49da270a4867b67bcbdf26110

    • SHA1

      67ff7fe72202bd7df0addd19f1b771b19576222e

    • SHA256

      2b57890accb6a045723f3cc849ab93df9c35a4d68574387177b733bda715f0b9

    • SHA512

      386f25df7d1c1e2320c0ad5f69a0279a7e5c837e5378598ea99a2d05f410e4364e82c607aebae45da9fb9ba6f1b1510443be719fb5f4cfab9f7c8b8340238b89

    • SSDEEP

      12288:6pUJ3r6YkVwJgNnSykgb9cqWnw4q6ZmFhqsi7KaIr:6pUNr6YkVRFkgbeqeo68FhqT7KaIr

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks