General

  • Target

    42c82a811f4eb41e1a6c613c9b017b7e8abf062c3694cb77e671464954facf3b

  • Size

    639KB

  • Sample

    220213-mtpwasghh8

  • MD5

    4ab860c4a0b02410cd0f5adf80153c3e

  • SHA1

    3983610f2687885b350d259b936a19a3f2c45f6b

  • SHA256

    42c82a811f4eb41e1a6c613c9b017b7e8abf062c3694cb77e671464954facf3b

  • SHA512

    5c982d65f306efc3a37ea97f7e4dc99d95c1f32b19c20e1872df31349ac25f65bd5a6422aa561ababa745d320f8545c94b20a5e85c1d10638f303414eba713c0

Malware Config

Extracted

Family

latam_generic_downloader

C2

https://s3-eu-west-1.amazonaws.com/frezaaaewrwty/image2.png

Targets

    • Target

      42c82a811f4eb41e1a6c613c9b017b7e8abf062c3694cb77e671464954facf3b

    • Size

      639KB

    • MD5

      4ab860c4a0b02410cd0f5adf80153c3e

    • SHA1

      3983610f2687885b350d259b936a19a3f2c45f6b

    • SHA256

      42c82a811f4eb41e1a6c613c9b017b7e8abf062c3694cb77e671464954facf3b

    • SHA512

      5c982d65f306efc3a37ea97f7e4dc99d95c1f32b19c20e1872df31349ac25f65bd5a6422aa561ababa745d320f8545c94b20a5e85c1d10638f303414eba713c0

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

4
T1082

Tasks