General

  • Target

    loader.exe

  • Size

    363KB

  • Sample

    250328-rflzpsw1dt

  • MD5

    1b0b97cb1346c496b8368b3e9622d8fd

  • SHA1

    ebe3c3f59f26d341933317dec9ed00b041c90d04

  • SHA256

    32ea7d3ceea4b73b2a98ef55aebc41581fdfad995fe9d9cc2411dedc1806f28a

  • SHA512

    05a4933ed5c5f965058c03ff00828e7bafc71966804955d7962bc6cb8ebab96a1c8f435b9157da3c2a8aa8549b0807d902820831a7ca1108f6491fa6919fe22e

  • SSDEEP

    6144:a5kgvH9LLVEbIALguKV5BwUnZqazMhD9RLJt88sndcP8pPyDvUGOksWb:s9Lh9qKLBwiZlzMB9xgndcP88DvvP

Malware Config

Targets

    • Target

      loader.exe

    • Size

      363KB

    • MD5

      1b0b97cb1346c496b8368b3e9622d8fd

    • SHA1

      ebe3c3f59f26d341933317dec9ed00b041c90d04

    • SHA256

      32ea7d3ceea4b73b2a98ef55aebc41581fdfad995fe9d9cc2411dedc1806f28a

    • SHA512

      05a4933ed5c5f965058c03ff00828e7bafc71966804955d7962bc6cb8ebab96a1c8f435b9157da3c2a8aa8549b0807d902820831a7ca1108f6491fa6919fe22e

    • SSDEEP

      6144:a5kgvH9LLVEbIALguKV5BwUnZqazMhD9RLJt88sndcP8pPyDvUGOksWb:s9Lh9qKLBwiZlzMB9xgndcP88DvvP

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to get system information.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks