General

  • Target

    b58ce9efc60bf3b96e5ae33f0ff0d5db.exe

  • Size

    1.7MB

  • Sample

    220702-q489gahdd6

  • MD5

    b58ce9efc60bf3b96e5ae33f0ff0d5db

  • SHA1

    b6d43d0e1979328a6e9f70e7606ee29e3011ccf1

  • SHA256

    a2a7bcdb4d33cd563018a1b9875a49a89d6637b8b0843de2b8f62bc65f980071

  • SHA512

    6d26907ac1cc5d95197f381c1b276a6d653e7d8274a5e11c7df927303228960a2f20525be7fcf0902bc538ae230f6a21ae3592ba4386296a6571f26fd1b11599

Malware Config

Targets

    • Target

      b58ce9efc60bf3b96e5ae33f0ff0d5db.exe

    • Size

      1.7MB

    • MD5

      b58ce9efc60bf3b96e5ae33f0ff0d5db

    • SHA1

      b6d43d0e1979328a6e9f70e7606ee29e3011ccf1

    • SHA256

      a2a7bcdb4d33cd563018a1b9875a49a89d6637b8b0843de2b8f62bc65f980071

    • SHA512

      6d26907ac1cc5d95197f381c1b276a6d653e7d8274a5e11c7df927303228960a2f20525be7fcf0902bc538ae230f6a21ae3592ba4386296a6571f26fd1b11599

    • Detected google phishing page

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks