General

  • Target

    Insta乗っ取り.exe

  • Size

    12.8MB

  • Sample

    241126-p9b1gsslat

  • MD5

    de7860d4d6be9c13acee02489caa19a5

  • SHA1

    4b561424d054f36c247f400e95ec0a4a226687d3

  • SHA256

    bc6af9ff1b56c779aa75f349a07c4627905f01dff6a68565b4b4baa4ee9f5d70

  • SHA512

    bbebb9d972d6653639b597527d70798626eacb93b89a3227da480a0091b8fae08988082633043bc76b741420eb18385b5025c115e451938bf9d83b05230fd74f

  • SSDEEP

    393216:9892kr6LfOYD+hQdPC5OA3+76PHWaZOIEUespeZlMQJM9YH:CVmLGYD+haC5OA3+76PHq40MQO6

Malware Config

Targets

    • Target

      Insta乗っ取り.exe

    • Size

      12.8MB

    • MD5

      de7860d4d6be9c13acee02489caa19a5

    • SHA1

      4b561424d054f36c247f400e95ec0a4a226687d3

    • SHA256

      bc6af9ff1b56c779aa75f349a07c4627905f01dff6a68565b4b4baa4ee9f5d70

    • SHA512

      bbebb9d972d6653639b597527d70798626eacb93b89a3227da480a0091b8fae08988082633043bc76b741420eb18385b5025c115e451938bf9d83b05230fd74f

    • SSDEEP

      393216:9892kr6LfOYD+hQdPC5OA3+76PHWaZOIEUespeZlMQJM9YH:CVmLGYD+haC5OA3+76PHq40MQO6

    • Modifies WinLogon for persistence

    • UAC bypass

    • Disables Task Manager via registry modification

    • Possible privilege escalation attempt

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks