General

  • Target

    75b9d7a1cb7be0b867b5689bf9737812948669dc2d2ae65e6f78b899b13e5e13N

  • Size

    127KB

  • Sample

    240920-yrxznsvgkq

  • MD5

    e673826d4aab0000086152f00d9e3940

  • SHA1

    3b2b6fb5f069fa763ffdf03832d4fb06d6ea4f43

  • SHA256

    75b9d7a1cb7be0b867b5689bf9737812948669dc2d2ae65e6f78b899b13e5e13

  • SHA512

    c87b78964e5eca75b4beeedfd51cb3275c01443d33a66c3f44cb9d4d67b48247563fb36d18fe495462da88a86b7b6c2e567863b1b2cbabf1bcdc3bb9d66927f2

  • SSDEEP

    1536:Xamlu3hbBGy3G8nhMpD7MUYU6U5jUdPQc+n35KZg8/nouy8Iu:XreMPd/MYjUtQl78vout

Malware Config

Targets

    • Target

      75b9d7a1cb7be0b867b5689bf9737812948669dc2d2ae65e6f78b899b13e5e13N

    • Size

      127KB

    • MD5

      e673826d4aab0000086152f00d9e3940

    • SHA1

      3b2b6fb5f069fa763ffdf03832d4fb06d6ea4f43

    • SHA256

      75b9d7a1cb7be0b867b5689bf9737812948669dc2d2ae65e6f78b899b13e5e13

    • SHA512

      c87b78964e5eca75b4beeedfd51cb3275c01443d33a66c3f44cb9d4d67b48247563fb36d18fe495462da88a86b7b6c2e567863b1b2cbabf1bcdc3bb9d66927f2

    • SSDEEP

      1536:Xamlu3hbBGy3G8nhMpD7MUYU6U5jUdPQc+n35KZg8/nouy8Iu:XreMPd/MYjUtQl78vout

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables use of System Restore points

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks