General

  • Target

    iidk.jar

  • Size

    639KB

  • Sample

    240627-ndm77sybpc

  • MD5

    252fd90861780cafa9c3636effd29d37

  • SHA1

    a5338e8c723f9643de231fbbe95bd4930964ac39

  • SHA256

    2d0ffc551620087ec69cbd4102297e9cd531d7d5e8337c8559795b5cc962d665

  • SHA512

    f53406416525546a66984ced9fef87226f23d818fb6f6e073adfe7c7983d08acd428047cc91934468ba8009a468da4fe368018bbaf001fe56f12b9ba4282b8b1

  • SSDEEP

    12288:/rJwQO/KYKlQf4TQIUPbgs/hRP+NmmNC5rgQBeRE13yuE2hwSlLDsI:/r+Qiilw4EvbgsjeHC5sKfyuZhLlLDsI

Malware Config

Targets

    • Target

      iidk.jar

    • Size

      639KB

    • MD5

      252fd90861780cafa9c3636effd29d37

    • SHA1

      a5338e8c723f9643de231fbbe95bd4930964ac39

    • SHA256

      2d0ffc551620087ec69cbd4102297e9cd531d7d5e8337c8559795b5cc962d665

    • SHA512

      f53406416525546a66984ced9fef87226f23d818fb6f6e073adfe7c7983d08acd428047cc91934468ba8009a468da4fe368018bbaf001fe56f12b9ba4282b8b1

    • SSDEEP

      12288:/rJwQO/KYKlQf4TQIUPbgs/hRP+NmmNC5rgQBeRE13yuE2hwSlLDsI:/r+Qiilw4EvbgsjeHC5sKfyuZhLlLDsI

    • Modifies file permissions

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

File and Directory Permissions Modification

1
T1222

Modify Registry

1
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Tasks