General

  • Target

    58704564529d35facea850f67d6af8a8a3150acc0f86e578660157bc2e2bd8df

  • Size

    337KB

  • Sample

    220625-v645rafhd2

  • MD5

    8f4b62ca3f67913f70263dcb2006bc33

  • SHA1

    c1962b906b2218a7965f48e943c2e2ccf16f9632

  • SHA256

    58704564529d35facea850f67d6af8a8a3150acc0f86e578660157bc2e2bd8df

  • SHA512

    2b13a3bd3b8748cb458878b7632814a2638ed5d079107782e09a2d7544e21944d0ef75b479246d04aeab6c802ab266724f784e2524340a5eed622764b6df8eda

Score
10/10

Malware Config

Targets

    • Target

      58704564529d35facea850f67d6af8a8a3150acc0f86e578660157bc2e2bd8df

    • Size

      337KB

    • MD5

      8f4b62ca3f67913f70263dcb2006bc33

    • SHA1

      c1962b906b2218a7965f48e943c2e2ccf16f9632

    • SHA256

      58704564529d35facea850f67d6af8a8a3150acc0f86e578660157bc2e2bd8df

    • SHA512

      2b13a3bd3b8748cb458878b7632814a2638ed5d079107782e09a2d7544e21944d0ef75b479246d04aeab6c802ab266724f784e2524340a5eed622764b6df8eda

    Score
    10/10
    • Detects PlugX Payload

    • PlugX

      PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

    • suricata: ET MALWARE Trojan.Win32.DLOADR.TIOIBEPQ CnC Traffic

      suricata: ET MALWARE Trojan.Win32.DLOADR.TIOIBEPQ CnC Traffic

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks