General

  • Target

    1bf36695b0709be363fabd107d3fe8f4b202b1e58b3665408107875839822715.exe

  • Size

    320KB

  • Sample

    241122-kwq52atnbl

  • MD5

    f994621fb8d39133c91165a336bfa517

  • SHA1

    02f1f61bd246cbb0a7cd7e1aed69e48628d15d7a

  • SHA256

    1bf36695b0709be363fabd107d3fe8f4b202b1e58b3665408107875839822715

  • SHA512

    e3bd52ae4070e6bab51802247788e91ad5edf66272fc2668bfff14c867636931c53eb19653bb081459e0f9f45bf4dcc9df03933863ff81d0a61c4d688e908b6b

  • SSDEEP

    6144:0TwZo1IV3puaibGKFHi0mofhaH05kipz016580bHFbl86JQPDHDdx/QtqRr:qXgvmzFHi0mo5aH0qMzd5807FRPJQPDH

Malware Config

Targets

    • Target

      1bf36695b0709be363fabd107d3fe8f4b202b1e58b3665408107875839822715.exe

    • Size

      320KB

    • MD5

      f994621fb8d39133c91165a336bfa517

    • SHA1

      02f1f61bd246cbb0a7cd7e1aed69e48628d15d7a

    • SHA256

      1bf36695b0709be363fabd107d3fe8f4b202b1e58b3665408107875839822715

    • SHA512

      e3bd52ae4070e6bab51802247788e91ad5edf66272fc2668bfff14c867636931c53eb19653bb081459e0f9f45bf4dcc9df03933863ff81d0a61c4d688e908b6b

    • SSDEEP

      6144:0TwZo1IV3puaibGKFHi0mofhaH05kipz016580bHFbl86JQPDHDdx/QtqRr:qXgvmzFHi0mo5aH0qMzd5807FRPJQPDH

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks