General
-
Target
image_2025-03-28_170136899.png
-
Size
253KB
-
Sample
250328-vng79syxes
-
MD5
2e0003e2bf5591f8e2ab3fbf939610b6
-
SHA1
b2020e09179a81ce5fe0409c6b1958439ce599db
-
SHA256
1031187bca73c151782d84b2c0f6efd74fd843071968351baa0b41b4bc59e939
-
SHA512
c30cb129be0d67e13b1ff504dadd268b10ebd86cc1d62feb97aeaf609e428ecf40dab15908104cc038423cad96279f3e1ad5f4c0ef7b823411d4918589d34b2a
-
SSDEEP
6144:b52wGQvtCDocvRj3csBfp2UrwyoSYUe/uS9lW:VVCBvRIsD2PyoScuelW
Static task
static1
Behavioral task
behavioral1
Sample
image_2025-03-28_170136899.png
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
image_2025-03-28_170136899.png
Resource
win10v2004-20250313-en
Malware Config
Targets
-
-
Target
image_2025-03-28_170136899.png
-
Size
253KB
-
MD5
2e0003e2bf5591f8e2ab3fbf939610b6
-
SHA1
b2020e09179a81ce5fe0409c6b1958439ce599db
-
SHA256
1031187bca73c151782d84b2c0f6efd74fd843071968351baa0b41b4bc59e939
-
SHA512
c30cb129be0d67e13b1ff504dadd268b10ebd86cc1d62feb97aeaf609e428ecf40dab15908104cc038423cad96279f3e1ad5f4c0ef7b823411d4918589d34b2a
-
SSDEEP
6144:b52wGQvtCDocvRj3csBfp2UrwyoSYUe/uS9lW:VVCBvRIsD2PyoScuelW
-
Modifies WinLogon for persistence
-
UAC bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
5