General

  • Target

    ABTech.exe

  • Size

    141.7MB

  • Sample

    241121-lzr26s1lfs

  • MD5

    1434c3fbbc8aadd0bdbeb17188ecbb30

  • SHA1

    87dd89f9645e0aad3a83a5e6a88fb32609811175

  • SHA256

    8968bebdc8a4a219676d0f03e4b9aa967f66dffedea0f165e4d99efce81443f7

  • SHA512

    18e0edff038df5b463081da229f7f426747759761d9aae75f1542cad1eadd12ab387bd0b978314259954919172bfb0881b59060ba15b765a936a9a0af4af7889

  • SSDEEP

    3145728:i9J2fFh9HdLSysODYjBxpxYES+LqOI4MTzU4UcpaPbHn:PFh9HpOWUBxp7SiqtTzEcpQH

Malware Config

Targets

    • Target

      ABTech.exe

    • Size

      141.7MB

    • MD5

      1434c3fbbc8aadd0bdbeb17188ecbb30

    • SHA1

      87dd89f9645e0aad3a83a5e6a88fb32609811175

    • SHA256

      8968bebdc8a4a219676d0f03e4b9aa967f66dffedea0f165e4d99efce81443f7

    • SHA512

      18e0edff038df5b463081da229f7f426747759761d9aae75f1542cad1eadd12ab387bd0b978314259954919172bfb0881b59060ba15b765a936a9a0af4af7889

    • SSDEEP

      3145728:i9J2fFh9HdLSysODYjBxpxYES+LqOI4MTzU4UcpaPbHn:PFh9HpOWUBxp7SiqtTzEcpQH

    • A potential corporate email address has been identified in the URL: [email protected]

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks