General

  • Target

    c72381ca276d8fb461b48bc0ef6e052e5ead112efc40d3998467042f4a7bd8e1.exe

  • Size

    216KB

  • Sample

    250117-rq5vkaskgp

  • MD5

    66b373d577a470e59415405cf2e87997

  • SHA1

    cdf93674df1a4f27df7c89cebb0aeba1e8df9168

  • SHA256

    c72381ca276d8fb461b48bc0ef6e052e5ead112efc40d3998467042f4a7bd8e1

  • SHA512

    a72384e956bf0e9664b6347e21662c0f641058759652f332d470e622701b1d0f9e63d97c6b90131861bff511ecd98ee4fbad5e0708471415ae99d2d01f85fb4e

  • SSDEEP

    3072:Ol6EgmJBkSju7dMIplpdWnWf1WYCPTkG8M8kkRqX66poLD8x8VnvupmYmcNovxG:O3BPju7B3zjNWlIG88k666qfVUFOpG

Malware Config

Targets

    • Target

      c72381ca276d8fb461b48bc0ef6e052e5ead112efc40d3998467042f4a7bd8e1.exe

    • Size

      216KB

    • MD5

      66b373d577a470e59415405cf2e87997

    • SHA1

      cdf93674df1a4f27df7c89cebb0aeba1e8df9168

    • SHA256

      c72381ca276d8fb461b48bc0ef6e052e5ead112efc40d3998467042f4a7bd8e1

    • SHA512

      a72384e956bf0e9664b6347e21662c0f641058759652f332d470e622701b1d0f9e63d97c6b90131861bff511ecd98ee4fbad5e0708471415ae99d2d01f85fb4e

    • SSDEEP

      3072:Ol6EgmJBkSju7dMIplpdWnWf1WYCPTkG8M8kkRqX66poLD8x8VnvupmYmcNovxG:O3BPju7B3zjNWlIG88k666qfVUFOpG

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks