General
-
Target
abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe
-
Size
216KB
-
Sample
250116-eky4lssleq
-
MD5
04da68ccae7faa684abfc3bc0b58cb40
-
SHA1
3df3a4e5a8c7226080c62db1eaafc01ad8d6a9a3
-
SHA256
abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510
-
SHA512
197a4598b306e07473ee634d68b684ca094cb9021c9690875d3a2205d44ce46ae5ac8ebe82377744540d34ab46d720b3c277a8d041c69caf783733b587e35a29
-
SSDEEP
3072:Ol6EgmJBkSju7dMIplpdWnWf1WYCPTkG8M8kkRqX66poLD8x8VnvupmYmcNovxC:O3BPju7B3zjNWlIG88k666qfVUFOpC
Static task
static1
Behavioral task
behavioral1
Sample
abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe
-
Size
216KB
-
MD5
04da68ccae7faa684abfc3bc0b58cb40
-
SHA1
3df3a4e5a8c7226080c62db1eaafc01ad8d6a9a3
-
SHA256
abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510
-
SHA512
197a4598b306e07473ee634d68b684ca094cb9021c9690875d3a2205d44ce46ae5ac8ebe82377744540d34ab46d720b3c277a8d041c69caf783733b587e35a29
-
SSDEEP
3072:Ol6EgmJBkSju7dMIplpdWnWf1WYCPTkG8M8kkRqX66poLD8x8VnvupmYmcNovxC:O3BPju7B3zjNWlIG88k666qfVUFOpC
-
Modifies WinLogon for persistence
-
Ramnit family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1