General

  • Target

    2320900000000.exe

  • Size

    494KB

  • Sample

    210610-qnh7k5fv4x

  • MD5

    b17442f88ff7c42751412f361e99b4f6

  • SHA1

    483b3ad59a7c1f96c277d1a753a588f3fc8f4c6f

  • SHA256

    7320b115d96ae0e50fe44d8600bd0bd68e2fac3bb4604f8f333f04e247c301bd

  • SHA512

    6b29abb8791d0772d1b358459528121871a1be043f3a3ee60d4da5df3bdb74fc93239c0f41f88432327111323ce13534d1fb35631393bd7d9ab7720c00d5e45b

Score
7/10

Malware Config

Targets

    • Target

      2320900000000.exe

    • Size

      494KB

    • MD5

      b17442f88ff7c42751412f361e99b4f6

    • SHA1

      483b3ad59a7c1f96c277d1a753a588f3fc8f4c6f

    • SHA256

      7320b115d96ae0e50fe44d8600bd0bd68e2fac3bb4604f8f333f04e247c301bd

    • SHA512

      6b29abb8791d0772d1b358459528121871a1be043f3a3ee60d4da5df3bdb74fc93239c0f41f88432327111323ce13534d1fb35631393bd7d9ab7720c00d5e45b

    Score
    7/10
    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks