General

  • Target

    04436C72506D84210A597C57880DBE3E.exe

  • Size

    1.4MB

  • Sample

    210724-4cqz9n5m8x

  • MD5

    04436c72506d84210a597c57880dbe3e

  • SHA1

    d77bf018b1fa76215f2ca680e4cf25ad034eb271

  • SHA256

    87fbd9577039b209cd0ce825d1c79aad0def611625b737fa3abe70802da4d6f4

  • SHA512

    4dcfcc70d77c0fcf0fc74622f37cd176f0130bf8158330a6588d6c4c5bfcafc082dd003d514a10bbb01b12af575a3558d6255e65fd6ca90204e886d3f6a92064

Score
10/10

Malware Config

Targets

    • Target

      04436C72506D84210A597C57880DBE3E.exe

    • Size

      1.4MB

    • MD5

      04436c72506d84210a597c57880dbe3e

    • SHA1

      d77bf018b1fa76215f2ca680e4cf25ad034eb271

    • SHA256

      87fbd9577039b209cd0ce825d1c79aad0def611625b737fa3abe70802da4d6f4

    • SHA512

      4dcfcc70d77c0fcf0fc74622f37cd176f0130bf8158330a6588d6c4c5bfcafc082dd003d514a10bbb01b12af575a3558d6255e65fd6ca90204e886d3f6a92064

    Score
    10/10
    • Modifies Windows Defender Real-time Protection settings

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Disabling Security Tools

1
T1089

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks