General
-
Target
fb1dddc298eb8e049c053ebc2e1585d7338769af53d60a635c296ad47d559dffN
-
Size
359KB
-
Sample
240919-1sjvjsseqe
-
MD5
8168ebc24991383d3ca87a3641cddf50
-
SHA1
099589f333ff8cab37ea6dcbc27b5873305b125a
-
SHA256
fb1dddc298eb8e049c053ebc2e1585d7338769af53d60a635c296ad47d559dff
-
SHA512
2a5131ce1e50ece6873899d2f90659bf5a5a1b4f77a38f32e714665507f9b4bfb8042d4568692c535cd8a150d7ef42354504a5819984944fc074a1c263b5bc08
-
SSDEEP
6144:VT17ZpbhRqk8WwtB17ZpbhRBk8Wwt0717ZpbhRqk8WwtwDdG/cw:Xqk8WwtTBk8WwtAqk8Wwtwuc
Static task
static1
Behavioral task
behavioral1
Sample
fb1dddc298eb8e049c053ebc2e1585d7338769af53d60a635c296ad47d559dffN.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
fb1dddc298eb8e049c053ebc2e1585d7338769af53d60a635c296ad47d559dffN
-
Size
359KB
-
MD5
8168ebc24991383d3ca87a3641cddf50
-
SHA1
099589f333ff8cab37ea6dcbc27b5873305b125a
-
SHA256
fb1dddc298eb8e049c053ebc2e1585d7338769af53d60a635c296ad47d559dff
-
SHA512
2a5131ce1e50ece6873899d2f90659bf5a5a1b4f77a38f32e714665507f9b4bfb8042d4568692c535cd8a150d7ef42354504a5819984944fc074a1c263b5bc08
-
SSDEEP
6144:VT17ZpbhRqk8WwtB17ZpbhRBk8Wwt0717ZpbhRqk8WwtwDdG/cw:Xqk8WwtTBk8WwtAqk8Wwtwuc
-
Modifies WinLogon for persistence
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1