General

  • Target

    Insta乗っ取り.exe

  • Size

    12.5MB

  • Sample

    241126-lxvqaawlax

  • MD5

    2ca14730747a21ef9a993ec1191504f1

  • SHA1

    f62b6796399b90d5864d73d4b1a8c3f26c727a0c

  • SHA256

    6f712342bf83b7a44dbad03c96e09f9455e0d159eed5223dbabebedf94c15e50

  • SHA512

    8d7fdebb474792efdbef07b6f7327a3cf38796106162d0ad254c63c56fc0322e63b0656fbe7fa073ecb3f12cfdb99a31227d902d2990a91094c5c8f5ef768b20

  • SSDEEP

    393216:Rxo6cAJGkrybt8Ku6RtUUqWOBGFXiR3Zr:7o6cerybt8K/PU9WO0FXiR3Z

Malware Config

Targets

    • Target

      Insta乗っ取り.exe

    • Size

      12.5MB

    • MD5

      2ca14730747a21ef9a993ec1191504f1

    • SHA1

      f62b6796399b90d5864d73d4b1a8c3f26c727a0c

    • SHA256

      6f712342bf83b7a44dbad03c96e09f9455e0d159eed5223dbabebedf94c15e50

    • SHA512

      8d7fdebb474792efdbef07b6f7327a3cf38796106162d0ad254c63c56fc0322e63b0656fbe7fa073ecb3f12cfdb99a31227d902d2990a91094c5c8f5ef768b20

    • SSDEEP

      393216:Rxo6cAJGkrybt8Ku6RtUUqWOBGFXiR3Zr:7o6cerybt8K/PU9WO0FXiR3Z

    • Modifies WinLogon for persistence

    • UAC bypass

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Disables Task Manager via registry modification

    • Possible privilege escalation attempt

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks