General

  • Target

    05ed376b3de1d54ac4af50d10b1f08c1

  • Size

    875KB

  • Sample

    210615-xx29hn9yzx

  • MD5

    05ed376b3de1d54ac4af50d10b1f08c1

  • SHA1

    def26ad3020710b39b79b97f4684d9e057c97b1c

  • SHA256

    6e992161f236fbafbb836065a819195d69af9ba7544ab71542111ac2b3ea8664

  • SHA512

    77afad95dd792ee83230bc8a9ec59285de882d9b19d3608da126e715505d4895b1c79ce10e1a553f175bc18e4dbad001b6e015d559cd601a1f50b450fd8aa19b

Score
10/10

Malware Config

Targets

    • Target

      05ed376b3de1d54ac4af50d10b1f08c1

    • Size

      875KB

    • MD5

      05ed376b3de1d54ac4af50d10b1f08c1

    • SHA1

      def26ad3020710b39b79b97f4684d9e057c97b1c

    • SHA256

      6e992161f236fbafbb836065a819195d69af9ba7544ab71542111ac2b3ea8664

    • SHA512

      77afad95dd792ee83230bc8a9ec59285de882d9b19d3608da126e715505d4895b1c79ce10e1a553f175bc18e4dbad001b6e015d559cd601a1f50b450fd8aa19b

    Score
    10/10
    • PlugX

      PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks