General

  • Target

    ring.exe

  • Size

    16.7MB

  • Sample

    241119-yandxawkdj

  • MD5

    dec85de31c5a9e3754ab0fcfed8a3e79

  • SHA1

    b47c8f4918518f1538842b5b12bc5dcbea5c3d59

  • SHA256

    fa4f6da9ea8aca025d129328ce57b36343a1bc8796d1846d02157d2242f904a8

  • SHA512

    34831ff6c2571f0354bd5958a036a0030c85cab0c6dcb47c881cb366a47adf20741d6a473be369c20a1535fde380f0be6bc53c5edb96d4729a92d4bbf47bf0aa

  • SSDEEP

    49152:3h+ZMbgw1VoIj5CSYS9o9IpHiYXcaXoMx+q2zAkcq085zXnCC7CWRUFGwhnb1b:3h+ZYD5DXc6oMx7CAkL0iz3T8T1b

Malware Config

Targets

    • Target

      ring.exe

    • Size

      16.7MB

    • MD5

      dec85de31c5a9e3754ab0fcfed8a3e79

    • SHA1

      b47c8f4918518f1538842b5b12bc5dcbea5c3d59

    • SHA256

      fa4f6da9ea8aca025d129328ce57b36343a1bc8796d1846d02157d2242f904a8

    • SHA512

      34831ff6c2571f0354bd5958a036a0030c85cab0c6dcb47c881cb366a47adf20741d6a473be369c20a1535fde380f0be6bc53c5edb96d4729a92d4bbf47bf0aa

    • SSDEEP

      49152:3h+ZMbgw1VoIj5CSYS9o9IpHiYXcaXoMx+q2zAkcq085zXnCC7CWRUFGwhnb1b:3h+ZYD5DXc6oMx7CAkL0iz3T8T1b

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks