General

  • Target

    2024-10-03_c5690db01fd457c5b917d15875bcb1bb_mafia

  • Size

    10.1MB

  • Sample

    241003-wrdjxsygrn

  • MD5

    c5690db01fd457c5b917d15875bcb1bb

  • SHA1

    b040860067b278990f7879391764a3581a8c6e8d

  • SHA256

    d73ac5ed91a98b0658696ad59ffdcfe9b38f934ee64b48df11c4764d4a5b88bd

  • SHA512

    db50facb24e236c11dca14ba840723ffdde90e4817db2a73d8bb02a0f4887ccc13318998447ce01a13d456c7d79bca3d3fb3b551042628ee4efb6e64331647f4

  • SSDEEP

    196608:q/26/2Qr9ehqLps8mVcrouNlsn74mjeneYd4EipHj:Mr9ehqiVQsUmCey4EAHj

Malware Config

Targets

    • Target

      2024-10-03_c5690db01fd457c5b917d15875bcb1bb_mafia

    • Size

      10.1MB

    • MD5

      c5690db01fd457c5b917d15875bcb1bb

    • SHA1

      b040860067b278990f7879391764a3581a8c6e8d

    • SHA256

      d73ac5ed91a98b0658696ad59ffdcfe9b38f934ee64b48df11c4764d4a5b88bd

    • SHA512

      db50facb24e236c11dca14ba840723ffdde90e4817db2a73d8bb02a0f4887ccc13318998447ce01a13d456c7d79bca3d3fb3b551042628ee4efb6e64331647f4

    • SSDEEP

      196608:q/26/2Qr9ehqLps8mVcrouNlsn74mjeneYd4EipHj:Mr9ehqiVQsUmCey4EAHj

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks