General

  • Target

    4cbfb67f5d5d9a526130ce63d9fb96c783899f42b11f11b1ec983dec8c3da559N

  • Size

    313KB

  • Sample

    240920-pzwxxaxdnk

  • MD5

    ca04727958d7489a8af766ee1ac6f7c0

  • SHA1

    857727adc78102e0f077933b56694965bddac65f

  • SHA256

    4cbfb67f5d5d9a526130ce63d9fb96c783899f42b11f11b1ec983dec8c3da559

  • SHA512

    1dbcc435b17ad9a69cabbbc4a47935a92c25921005d47313aae6ffb38388aaf49f70763570310a0d40b2079f8c6278e8b6a172bbaf8872ff6d90e7ec8f8aa9c6

  • SSDEEP

    6144:4eHwXUU5EYCTvaBjDjWrLJKuKnGML5Njcxd:4yMUusvalag5Njad

Malware Config

Targets

    • Target

      4cbfb67f5d5d9a526130ce63d9fb96c783899f42b11f11b1ec983dec8c3da559N

    • Size

      313KB

    • MD5

      ca04727958d7489a8af766ee1ac6f7c0

    • SHA1

      857727adc78102e0f077933b56694965bddac65f

    • SHA256

      4cbfb67f5d5d9a526130ce63d9fb96c783899f42b11f11b1ec983dec8c3da559

    • SHA512

      1dbcc435b17ad9a69cabbbc4a47935a92c25921005d47313aae6ffb38388aaf49f70763570310a0d40b2079f8c6278e8b6a172bbaf8872ff6d90e7ec8f8aa9c6

    • SSDEEP

      6144:4eHwXUU5EYCTvaBjDjWrLJKuKnGML5Njcxd:4yMUusvalag5Njad

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Disables use of System Restore points

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks