General
-
Target
a0127c6b20e18d62795ff85d076c30b6aee74142979fe0e0b5ef4bdd8e35ac25N.exe
-
Size
6.5MB
-
Sample
241122-nacmasvraq
-
MD5
404fc7178fb12b86408b94a29b5b4520
-
SHA1
377d56f41d8945c35ee678eaf016c5a05370482a
-
SHA256
a0127c6b20e18d62795ff85d076c30b6aee74142979fe0e0b5ef4bdd8e35ac25
-
SHA512
9fcdcb23ae29c7059d6247c8942058188394700091cb79b1aef0c6a12914b43d14edfc29b42f03190beabde9c570311a91121515a8afa1184d57c8809fa796ef
-
SSDEEP
98304:QhyJPZYxnMe4V/cJtKpGvJc5twG9Nh0hxblrrVPZl:QoIxMe4cxhAYbrrVPZl
Static task
static1
Behavioral task
behavioral1
Sample
a0127c6b20e18d62795ff85d076c30b6aee74142979fe0e0b5ef4bdd8e35ac25N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a0127c6b20e18d62795ff85d076c30b6aee74142979fe0e0b5ef4bdd8e35ac25N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
a0127c6b20e18d62795ff85d076c30b6aee74142979fe0e0b5ef4bdd8e35ac25N.exe
-
Size
6.5MB
-
MD5
404fc7178fb12b86408b94a29b5b4520
-
SHA1
377d56f41d8945c35ee678eaf016c5a05370482a
-
SHA256
a0127c6b20e18d62795ff85d076c30b6aee74142979fe0e0b5ef4bdd8e35ac25
-
SHA512
9fcdcb23ae29c7059d6247c8942058188394700091cb79b1aef0c6a12914b43d14edfc29b42f03190beabde9c570311a91121515a8afa1184d57c8809fa796ef
-
SSDEEP
98304:QhyJPZYxnMe4V/cJtKpGvJc5twG9Nh0hxblrrVPZl:QoIxMe4cxhAYbrrVPZl
-
Modifies RDP port number used by Windows
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
3