General

  • Target

    386e23ec5e38c484f0b546b78e2480fc589f74f2233f3bcee060796f87f492d8

  • Size

    271KB

  • Sample

    220319-m3j2eagdaq

  • MD5

    a49c43b4d6b5610e0719a3947b9ecf8f

  • SHA1

    392883730fb2e9146a565a298d980632bde30650

  • SHA256

    386e23ec5e38c484f0b546b78e2480fc589f74f2233f3bcee060796f87f492d8

  • SHA512

    3d9680fa03a1fee9e64904f4108517a8de3e37976490b04bc717ea1e5b23cfec89ab3fe295e61e24b6617a5a5b15564ffb598785b32828c89f1b3e92e5f525f0

Malware Config

Targets

    • Target

      386e23ec5e38c484f0b546b78e2480fc589f74f2233f3bcee060796f87f492d8

    • Size

      271KB

    • MD5

      a49c43b4d6b5610e0719a3947b9ecf8f

    • SHA1

      392883730fb2e9146a565a298d980632bde30650

    • SHA256

      386e23ec5e38c484f0b546b78e2480fc589f74f2233f3bcee060796f87f492d8

    • SHA512

      3d9680fa03a1fee9e64904f4108517a8de3e37976490b04bc717ea1e5b23cfec89ab3fe295e61e24b6617a5a5b15564ffb598785b32828c89f1b3e92e5f525f0

    • GoldDragon

      GoldDragon is a second-stage backdoor attributed to Kimsuky.

    • suricata: ET MALWARE Windows TaskList Microsoft Windows DOS prompt command exit OUTBOUND

      suricata: ET MALWARE Windows TaskList Microsoft Windows DOS prompt command exit OUTBOUND

    • suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

      suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

    • Blocklisted process makes network request

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks