General

  • Target

    f54b6b92b5264dc3346c777fcfa1d8d77b5712f4afb6724bb9187c5e570af1d7

  • Size

    318KB

  • Sample

    220523-z77dqacbfp

  • MD5

    550fc8a8f7696cecdbd07ca25dcd6cfa

  • SHA1

    a4c39e8652379c0c0c380414c646c6a0c8b2bfbd

  • SHA256

    f54b6b92b5264dc3346c777fcfa1d8d77b5712f4afb6724bb9187c5e570af1d7

  • SHA512

    01d389bbf9f7b2dce7062a6f1019575c51236ca79e54579e3ecf0e0dd4abe3a2264292c123c913a62d3e87f97cf5c5b5691cbcd612be18202867263e1108ee4d

Score
10/10

Malware Config

Targets

    • Target

      f54b6b92b5264dc3346c777fcfa1d8d77b5712f4afb6724bb9187c5e570af1d7

    • Size

      318KB

    • MD5

      550fc8a8f7696cecdbd07ca25dcd6cfa

    • SHA1

      a4c39e8652379c0c0c380414c646c6a0c8b2bfbd

    • SHA256

      f54b6b92b5264dc3346c777fcfa1d8d77b5712f4afb6724bb9187c5e570af1d7

    • SHA512

      01d389bbf9f7b2dce7062a6f1019575c51236ca79e54579e3ecf0e0dd4abe3a2264292c123c913a62d3e87f97cf5c5b5691cbcd612be18202867263e1108ee4d

    Score
    10/10
    • Detects PlugX Payload

    • PlugX

      PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks