General

  • Target

    4b71451551fc49cb793675c1333df2023a2b0dfd67976a5ebe52600524794f01

  • Size

    263KB

  • Sample

    220524-az46ysdgbn

  • MD5

    582fb65add01ce95d827b96006a3ff42

  • SHA1

    d8931a791f8ef3d4015aec2bffa47808e28877b5

  • SHA256

    4b71451551fc49cb793675c1333df2023a2b0dfd67976a5ebe52600524794f01

  • SHA512

    6e2194abfba98c6723040b9d4e801a8d4e75cc8449d408638fa80edfa11865cad9d01b768c21919ed863f3e7f97d258930ccbbf6acbc0e65c730ead79f5c7141

Score
10/10

Malware Config

Targets

    • Target

      4b71451551fc49cb793675c1333df2023a2b0dfd67976a5ebe52600524794f01

    • Size

      263KB

    • MD5

      582fb65add01ce95d827b96006a3ff42

    • SHA1

      d8931a791f8ef3d4015aec2bffa47808e28877b5

    • SHA256

      4b71451551fc49cb793675c1333df2023a2b0dfd67976a5ebe52600524794f01

    • SHA512

      6e2194abfba98c6723040b9d4e801a8d4e75cc8449d408638fa80edfa11865cad9d01b768c21919ed863f3e7f97d258930ccbbf6acbc0e65c730ead79f5c7141

    Score
    10/10
    • Detects PlugX Payload

    • PlugX

      PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks