General

  • Target

    152aad5f51fc4b3556da017138ccff2b5a27a320fbf9b5b0d290f148cfc144a1.exe

  • Size

    393KB

  • Sample

    241001-bfacxaxdmb

  • MD5

    63e1f3ecfb67565483ff6194e7c53f20

  • SHA1

    857a5f30ab5961b9bce69129b20479b57659baaf

  • SHA256

    152aad5f51fc4b3556da017138ccff2b5a27a320fbf9b5b0d290f148cfc144a1

  • SHA512

    ac102522f29c311e0e513f8258de446da621b9f0c95f34dfc94da87777830252015397c8a08022a35b40a193421b3f41a7ccd73edde95f62cbeb7573b198be99

  • SSDEEP

    6144:UUSPdVs/kAYrtfUnLopuKbEz43Ws+Y/jJQDlrIVpVsrZCzNnG9prZ8:ygaE0+gXNn

Malware Config

Targets

    • Target

      152aad5f51fc4b3556da017138ccff2b5a27a320fbf9b5b0d290f148cfc144a1.exe

    • Size

      393KB

    • MD5

      63e1f3ecfb67565483ff6194e7c53f20

    • SHA1

      857a5f30ab5961b9bce69129b20479b57659baaf

    • SHA256

      152aad5f51fc4b3556da017138ccff2b5a27a320fbf9b5b0d290f148cfc144a1

    • SHA512

      ac102522f29c311e0e513f8258de446da621b9f0c95f34dfc94da87777830252015397c8a08022a35b40a193421b3f41a7ccd73edde95f62cbeb7573b198be99

    • SSDEEP

      6144:UUSPdVs/kAYrtfUnLopuKbEz43Ws+Y/jJQDlrIVpVsrZCzNnG9prZ8:ygaE0+gXNn

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks