General

  • Target

    581b2e93b2ce8c6322831dd27187b059459aebae55f41ab43c63b2264e81a590

  • Size

    253KB

  • Sample

    220625-v6vw3sfhb8

  • MD5

    7b0bbf1954bfe5f09cf742acd5b47cea

  • SHA1

    bd3cae7bfc1e52f3ab25136c89ca823ba29d203c

  • SHA256

    581b2e93b2ce8c6322831dd27187b059459aebae55f41ab43c63b2264e81a590

  • SHA512

    f94faabf3673798955d91b0214d955786a1573db0822aee37a0fba0602003cc1714b8abcc233a39a7d251834fc8fd4660874f6aec8a9b80a8e66ab2f2910c807

Score
10/10

Malware Config

Targets

    • Target

      581b2e93b2ce8c6322831dd27187b059459aebae55f41ab43c63b2264e81a590

    • Size

      253KB

    • MD5

      7b0bbf1954bfe5f09cf742acd5b47cea

    • SHA1

      bd3cae7bfc1e52f3ab25136c89ca823ba29d203c

    • SHA256

      581b2e93b2ce8c6322831dd27187b059459aebae55f41ab43c63b2264e81a590

    • SHA512

      f94faabf3673798955d91b0214d955786a1573db0822aee37a0fba0602003cc1714b8abcc233a39a7d251834fc8fd4660874f6aec8a9b80a8e66ab2f2910c807

    Score
    10/10
    • Detects PlugX Payload

    • PlugX

      PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks