General

  • Target

    3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8

  • Size

    364KB

  • Sample

    220625-efbgrafdb6

  • MD5

    3bdcd75949bc028311649557395aad17

  • SHA1

    7c1c010814a2308891a54a095fa2b57a178b9bc6

  • SHA256

    3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8

  • SHA512

    2edaf28d957a23bf3cef4df128fef096bc71a07adcc45028d05740392328619c37ac008b3e3303457d3598c9fd3638ee980511010311a903d96dfa85eb34d9ab

Score
10/10

Malware Config

Targets

    • Target

      3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8

    • Size

      364KB

    • MD5

      3bdcd75949bc028311649557395aad17

    • SHA1

      7c1c010814a2308891a54a095fa2b57a178b9bc6

    • SHA256

      3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8

    • SHA512

      2edaf28d957a23bf3cef4df128fef096bc71a07adcc45028d05740392328619c37ac008b3e3303457d3598c9fd3638ee980511010311a903d96dfa85eb34d9ab

    Score
    10/10
    • Detects PlugX Payload

    • PlugX

      PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks