General

  • Target

    Insta乗っ取り.exe

  • Size

    12.5MB

  • Sample

    241126-lr9x1swjev

  • MD5

    fe794ef01fc95b216dca533b7ccc8b4c

  • SHA1

    07a5710f43b9e11c13d2ccc8f306c9385d7a9bae

  • SHA256

    48846a5cce72fc0e5e95b20502090054f058102713608f9645a655e8fc46c18d

  • SHA512

    134feb1e211223cd0fd00d575baaf2d5bc2d18be6ab8827df83a6ed12c8c05efee6cdf1c0798e3dfe0c459a114a2ceb4f09c445b31807129b2471aa69a82aa83

  • SSDEEP

    196608:39RVHK+t1R5TYzj8YmmR9hAlh6A5/qJIERkOknerjb6hJGJzYx07KyfBYcr:33VHgzjmmpxAlM1RnahJMYx07KyJ

Malware Config

Targets

    • Target

      Insta乗っ取り.exe

    • Size

      12.5MB

    • MD5

      fe794ef01fc95b216dca533b7ccc8b4c

    • SHA1

      07a5710f43b9e11c13d2ccc8f306c9385d7a9bae

    • SHA256

      48846a5cce72fc0e5e95b20502090054f058102713608f9645a655e8fc46c18d

    • SHA512

      134feb1e211223cd0fd00d575baaf2d5bc2d18be6ab8827df83a6ed12c8c05efee6cdf1c0798e3dfe0c459a114a2ceb4f09c445b31807129b2471aa69a82aa83

    • SSDEEP

      196608:39RVHK+t1R5TYzj8YmmR9hAlh6A5/qJIERkOknerjb6hJGJzYx07KyfBYcr:33VHgzjmmpxAlM1RnahJMYx07KyJ

    • Modifies WinLogon for persistence

    • UAC bypass

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Possible privilege escalation attempt

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks