General

  • Target

    7681ce2d372a70dfa4acbe6736edbf8ecf43b99f20cadda24596d7d9ee2bc7c0N

  • Size

    9.2MB

  • Sample

    241006-hcelsavblr

  • MD5

    90d4eeb13d02455640cca508b2a0cc40

  • SHA1

    f85f1749ffd854e8f7862f10a6a54423e63ec39b

  • SHA256

    7681ce2d372a70dfa4acbe6736edbf8ecf43b99f20cadda24596d7d9ee2bc7c0

  • SHA512

    6cfc0f987fe1f86cacd2302fd0f732f8c2725646b615c8fd1990db79db59af3b20342257edfc2e6680f7c8bba0ebe2eaed021c1ee036f746c6e0ad8ba947665f

  • SSDEEP

    6144:IriTOeUceEZPVB18RdCqdomsKAgh/lI86JQPDHDdx/Qtqx:phZdv8R0qRsKAg9lIPJQPDHvd

Malware Config

Targets

    • Target

      7681ce2d372a70dfa4acbe6736edbf8ecf43b99f20cadda24596d7d9ee2bc7c0N

    • Size

      9.2MB

    • MD5

      90d4eeb13d02455640cca508b2a0cc40

    • SHA1

      f85f1749ffd854e8f7862f10a6a54423e63ec39b

    • SHA256

      7681ce2d372a70dfa4acbe6736edbf8ecf43b99f20cadda24596d7d9ee2bc7c0

    • SHA512

      6cfc0f987fe1f86cacd2302fd0f732f8c2725646b615c8fd1990db79db59af3b20342257edfc2e6680f7c8bba0ebe2eaed021c1ee036f746c6e0ad8ba947665f

    • SSDEEP

      6144:IriTOeUceEZPVB18RdCqdomsKAgh/lI86JQPDHDdx/Qtqx:phZdv8R0qRsKAg9lIPJQPDHvd

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks