Resubmissions

28/09/2024, 06:57

240928-hq9dbasekr 3

28/09/2024, 06:54

240928-hpl7dsvdjb 3

28/09/2024, 06:52

240928-hm3rcsvclg 10

28/09/2024, 06:48

240928-hktqnsscjj 4

28/09/2024, 06:43

240928-hha6jsvakc 10

General

  • Target

    LoveYou.exe

  • Size

    22KB

  • Sample

    240928-hha6jsvakc

  • MD5

    31420227141ade98a5a5228bf8e6a97d

  • SHA1

    19329845635ebbc5c4026e111650d3ef42ab05ac

  • SHA256

    1edc8771e2a1a70023fc9ddeb5a6bc950380224b75e8306eb70da8eb80cb5b71

  • SHA512

    cbb18a6667b377eb68395cfd8df52b7d93c4554c3b5ab32c70e73b86e3dedb7949122fe8eea9530cd53944b45a1b699380bf1e9e5254af04d8409c594a52c0e7

  • SSDEEP

    384:o4LBivz/4RHCxN3IBUDzfGWCw2cKgDwg7dEsL9s+cLUoHl:o4LBu74Ro9ImnfGWJ2cKgsgZDW+cLUe

Malware Config

Targets

    • Target

      LoveYou.exe

    • Size

      22KB

    • MD5

      31420227141ade98a5a5228bf8e6a97d

    • SHA1

      19329845635ebbc5c4026e111650d3ef42ab05ac

    • SHA256

      1edc8771e2a1a70023fc9ddeb5a6bc950380224b75e8306eb70da8eb80cb5b71

    • SHA512

      cbb18a6667b377eb68395cfd8df52b7d93c4554c3b5ab32c70e73b86e3dedb7949122fe8eea9530cd53944b45a1b699380bf1e9e5254af04d8409c594a52c0e7

    • SSDEEP

      384:o4LBivz/4RHCxN3IBUDzfGWCw2cKgDwg7dEsL9s+cLUoHl:o4LBu74Ro9ImnfGWJ2cKgsgZDW+cLUe

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks