General

  • Target

    737a4dd3fb8f20c4190e588383f48c3de13c4a7f97d4814d63da02ce4a8fd7edN

  • Size

    585KB

  • Sample

    240919-ga2g4atbjd

  • MD5

    24eb147745e301d8c1ee2726de7ce230

  • SHA1

    cc7a807ad415652bffcae48f4e78c79d12155912

  • SHA256

    737a4dd3fb8f20c4190e588383f48c3de13c4a7f97d4814d63da02ce4a8fd7ed

  • SHA512

    119afb5e5d77a83de7ee9337fa7ffdd36a28d93957d7f4a46a7f70ce04589456eb6bd3786d14220dc9c0902a5c370003e40da179c71c14fcbf146a9f7cfbc429

  • SSDEEP

    6144:3eHwXUU5EYCTvaBjRjWrLJKuKnGML5Njcxmu3ijWrLJKuKnGML5Njcxgu3hjWrL/:3yMUusvalgg5Njam8g5Njagxg5NjagC

Malware Config

Targets

    • Target

      737a4dd3fb8f20c4190e588383f48c3de13c4a7f97d4814d63da02ce4a8fd7edN

    • Size

      585KB

    • MD5

      24eb147745e301d8c1ee2726de7ce230

    • SHA1

      cc7a807ad415652bffcae48f4e78c79d12155912

    • SHA256

      737a4dd3fb8f20c4190e588383f48c3de13c4a7f97d4814d63da02ce4a8fd7ed

    • SHA512

      119afb5e5d77a83de7ee9337fa7ffdd36a28d93957d7f4a46a7f70ce04589456eb6bd3786d14220dc9c0902a5c370003e40da179c71c14fcbf146a9f7cfbc429

    • SSDEEP

      6144:3eHwXUU5EYCTvaBjRjWrLJKuKnGML5Njcxmu3ijWrLJKuKnGML5Njcxgu3hjWrL/:3yMUusvalgg5Njam8g5Njagxg5NjagC

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Disables use of System Restore points

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks