General
-
Target
Client.exe
-
Size
378KB
-
Sample
241121-h85svazlew
-
MD5
7b14a00f19e0fb39b84b37a9365d19ec
-
SHA1
c3bd379a385d4db71df719c25495aca101f3396d
-
SHA256
8bd8893f47bbc91bef5e7b9747ef4a7cf36c749a2c21c5af1e0dd297ddc20991
-
SHA512
a19ff44b31eed8a622c5e78a75c2d8132e2d29a051595e1d0fb9ab0b4f1144d561206ba3e8b3685903ff7c0dd85a2d979ce1548ff94a9da11a82aff614e01610
-
SSDEEP
6144:b0jZ/ce6pz9Jge6VlWT8b9qhlm23w3crW3rboZb:bYMpsPVle8YhLB/
Static task
static1
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Client.exe
-
Size
378KB
-
MD5
7b14a00f19e0fb39b84b37a9365d19ec
-
SHA1
c3bd379a385d4db71df719c25495aca101f3396d
-
SHA256
8bd8893f47bbc91bef5e7b9747ef4a7cf36c749a2c21c5af1e0dd297ddc20991
-
SHA512
a19ff44b31eed8a622c5e78a75c2d8132e2d29a051595e1d0fb9ab0b4f1144d561206ba3e8b3685903ff7c0dd85a2d979ce1548ff94a9da11a82aff614e01610
-
SSDEEP
6144:b0jZ/ce6pz9Jge6VlWT8b9qhlm23w3crW3rboZb:bYMpsPVle8YhLB/
Score10/10-
Modifies WinLogon for persistence
-
Disables Task Manager via registry modification
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1