General

  • Target

    doeihdsjfnajdfuewrywuefhsdkjaf.exe

  • Size

    1.7MB

  • Sample

    210424-2y6ag96nv6

  • MD5

    4db5926d31dff252464855326a137e2f

  • SHA1

    9cb531b8962467f54264da21426d23445a935ce4

  • SHA256

    ef8ba7d931f440b4c611a539349cdef819f9d0def97dbfbdb694209d09cef511

  • SHA512

    71bda130ffb78a6bd1615984e599006bf6d8f1c5e182dffcb60a4e6a3ba162f6067c7de702f8e275fd9436ef18ab27b686ce75f254d1f40d3c560e7d3f6dc5c2

Score
10/10

Malware Config

Targets

    • Target

      doeihdsjfnajdfuewrywuefhsdkjaf.exe

    • Size

      1.7MB

    • MD5

      4db5926d31dff252464855326a137e2f

    • SHA1

      9cb531b8962467f54264da21426d23445a935ce4

    • SHA256

      ef8ba7d931f440b4c611a539349cdef819f9d0def97dbfbdb694209d09cef511

    • SHA512

      71bda130ffb78a6bd1615984e599006bf6d8f1c5e182dffcb60a4e6a3ba162f6067c7de702f8e275fd9436ef18ab27b686ce75f254d1f40d3c560e7d3f6dc5c2

    Score
    10/10
    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Command and Control

Connection Proxy

1
T1090

Tasks