General

  • Target

    0f50d970d712f542762c8c94b8ea5f8b6bb8e5fdf65072cae0ba0e919bb1577dN.exe

  • Size

    100KB

  • Sample

    241217-ggprwasldt

  • MD5

    f11bf26c16e24ef0e8f7d1d5706d38f0

  • SHA1

    592499371eed136a9dbd524d9b3216ed917b6887

  • SHA256

    0f50d970d712f542762c8c94b8ea5f8b6bb8e5fdf65072cae0ba0e919bb1577d

  • SHA512

    6d574e80c1886a5b6efbe35514b09f9c41b6efdd57a9fbddf1ef9256dbac88257b472ca2882158e3b7f2d157328dbe979824b4c0ce6fe7f8db56c2f1faada57e

  • SSDEEP

    3072:y/BI4QbZiKLq6RObXUKk6Ztd2/v0PFk8jwaaHw7Koj4reP:eOXYKeqoE/v0

Malware Config

Targets

    • Target

      0f50d970d712f542762c8c94b8ea5f8b6bb8e5fdf65072cae0ba0e919bb1577dN.exe

    • Size

      100KB

    • MD5

      f11bf26c16e24ef0e8f7d1d5706d38f0

    • SHA1

      592499371eed136a9dbd524d9b3216ed917b6887

    • SHA256

      0f50d970d712f542762c8c94b8ea5f8b6bb8e5fdf65072cae0ba0e919bb1577d

    • SHA512

      6d574e80c1886a5b6efbe35514b09f9c41b6efdd57a9fbddf1ef9256dbac88257b472ca2882158e3b7f2d157328dbe979824b4c0ce6fe7f8db56c2f1faada57e

    • SSDEEP

      3072:y/BI4QbZiKLq6RObXUKk6Ztd2/v0PFk8jwaaHw7Koj4reP:eOXYKeqoE/v0

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks