General

  • Target

    28f5a8a63790d953011bab8215fd5fce3eb86000eda52a5d12e5c82c17e871b5

  • Size

    87KB

  • Sample

    220130-z9e29aahan

  • MD5

    6582020176a2fe7af61fa0fcc4e0ac85

  • SHA1

    520ea4e28384e749f4c09144de9446f9fa32b731

  • SHA256

    28f5a8a63790d953011bab8215fd5fce3eb86000eda52a5d12e5c82c17e871b5

  • SHA512

    526dc57c80341117afa7dea5899903beee300cdfdb459a39f2f5bcaabe7af496f3ff8e5ad02a324923c9a005deef0b47a3f8397f291643039809385d57d96401

Malware Config

Targets

    • Target

      28f5a8a63790d953011bab8215fd5fce3eb86000eda52a5d12e5c82c17e871b5

    • Size

      87KB

    • MD5

      6582020176a2fe7af61fa0fcc4e0ac85

    • SHA1

      520ea4e28384e749f4c09144de9446f9fa32b731

    • SHA256

      28f5a8a63790d953011bab8215fd5fce3eb86000eda52a5d12e5c82c17e871b5

    • SHA512

      526dc57c80341117afa7dea5899903beee300cdfdb459a39f2f5bcaabe7af496f3ff8e5ad02a324923c9a005deef0b47a3f8397f291643039809385d57d96401

    • Drops file in Drivers directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Tasks