General

  • Target

    Sleezy Perm Spoofer.exe

  • Size

    72KB

  • Sample

    240929-qhykvawbmk

  • MD5

    c7fa66cb839a5c047dfc5944d985f21d

  • SHA1

    ad9479cf63355b8688143783b34d75b5011f282c

  • SHA256

    21a46980cf609bf75fb097d49dea0dc2ea290a2542d2ce98b2b96a0a67d69ad1

  • SHA512

    7deff8439bae8cf706b48dfc3e59354f670dd3e440323ca1d4d07a6c79fbdbaefb74c1b2c29aef4b7dc7dad5f1a4d3fd886db0662d25280df8a88b06cde1ea8c

  • SSDEEP

    1536:y+Hrk2gaqT9Zgtpbl+YuT/Mfh8oSFxSAyseMML1JWma73WVGlxWAItUu:9gHTcbUYuTSWRFQ52/Yt

Malware Config

Targets

    • Target

      Sleezy Perm Spoofer.exe

    • Size

      72KB

    • MD5

      c7fa66cb839a5c047dfc5944d985f21d

    • SHA1

      ad9479cf63355b8688143783b34d75b5011f282c

    • SHA256

      21a46980cf609bf75fb097d49dea0dc2ea290a2542d2ce98b2b96a0a67d69ad1

    • SHA512

      7deff8439bae8cf706b48dfc3e59354f670dd3e440323ca1d4d07a6c79fbdbaefb74c1b2c29aef4b7dc7dad5f1a4d3fd886db0662d25280df8a88b06cde1ea8c

    • SSDEEP

      1536:y+Hrk2gaqT9Zgtpbl+YuT/Mfh8oSFxSAyseMML1JWma73WVGlxWAItUu:9gHTcbUYuTSWRFQ52/Yt

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks