General

  • Target

    e42b2065cd7683b0be8702853b309e09474f23ff67851cb8295686194006622a.exe

  • Size

    2.9MB

  • Sample

    240912-cflavavhnr

  • MD5

    ee557be5d5e16d9ea01241f09a19a87b

  • SHA1

    e83e01dca3b3684e4f417b85bb4172dc635377e8

  • SHA256

    e42b2065cd7683b0be8702853b309e09474f23ff67851cb8295686194006622a

  • SHA512

    1ec2e18ae64ad994b279c4778c85d17df40d8de889d04c312a24b5bdf70fe1696f926016cc10e891e0fc2b0811d8f89b86d593ed6ff7a96b2c83d489bc3e1ce9

  • SSDEEP

    12288:sR2wFm7mveI0f0bA1n4ADwC8ZjE8E27hs4k2BX48gUaZczMAjiCrj:s9m7my0bA2ADw7E8H73I8gU0czL7j

Malware Config

Targets

    • Target

      e42b2065cd7683b0be8702853b309e09474f23ff67851cb8295686194006622a.exe

    • Size

      2.9MB

    • MD5

      ee557be5d5e16d9ea01241f09a19a87b

    • SHA1

      e83e01dca3b3684e4f417b85bb4172dc635377e8

    • SHA256

      e42b2065cd7683b0be8702853b309e09474f23ff67851cb8295686194006622a

    • SHA512

      1ec2e18ae64ad994b279c4778c85d17df40d8de889d04c312a24b5bdf70fe1696f926016cc10e891e0fc2b0811d8f89b86d593ed6ff7a96b2c83d489bc3e1ce9

    • SSDEEP

      12288:sR2wFm7mveI0f0bA1n4ADwC8ZjE8E27hs4k2BX48gUaZczMAjiCrj:s9m7my0bA2ADw7E8H73I8gU0czL7j

    • UAC bypass

    • Windows security bypass

    • Adds policy Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks