General
-
Target
71a989d9d893661e66be5d259cad821f5dbc0a58933ea69cd0634b87d42e89db.exe.vir
-
Size
21.2MB
-
Sample
241122-ecltbatpb1
-
MD5
f6ce1ee1de72a6286bc07263b1f3935a
-
SHA1
514703f64abfa8ab53995cdacda6e90fc8b4650a
-
SHA256
71a989d9d893661e66be5d259cad821f5dbc0a58933ea69cd0634b87d42e89db
-
SHA512
e3906cd91a466f91a6717d9568603e0b733f29286d1fe73256bb0b105fa50dc54a33bb3e013521c9ec5ff43101ea40f912d000c16d93f4ba0587dcab18b0399b
-
SSDEEP
393216:kecsJTzmKnYuOKzur7M+uQTwLCrws9PuRX08rYK4FcQod:ZNYyzC7PuwqCEsIRXlV4nod
Static task
static1
Behavioral task
behavioral1
Sample
71a989d9d893661e66be5d259cad821f5dbc0a58933ea69cd0634b87d42e89db.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
71a989d9d893661e66be5d259cad821f5dbc0a58933ea69cd0634b87d42e89db.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
71a989d9d893661e66be5d259cad821f5dbc0a58933ea69cd0634b87d42e89db.exe.vir
-
Size
21.2MB
-
MD5
f6ce1ee1de72a6286bc07263b1f3935a
-
SHA1
514703f64abfa8ab53995cdacda6e90fc8b4650a
-
SHA256
71a989d9d893661e66be5d259cad821f5dbc0a58933ea69cd0634b87d42e89db
-
SHA512
e3906cd91a466f91a6717d9568603e0b733f29286d1fe73256bb0b105fa50dc54a33bb3e013521c9ec5ff43101ea40f912d000c16d93f4ba0587dcab18b0399b
-
SSDEEP
393216:kecsJTzmKnYuOKzur7M+uQTwLCrws9PuRX08rYK4FcQod:ZNYyzC7PuwqCEsIRXlV4nod
-
Modifies RDP port number used by Windows
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
3