General

  • Target

    45ffc05cf9e7784a2527f622f699504cf7046645956b8ee7e61501ea20ce5557

  • Size

    289KB

  • Sample

    220707-l7npqacdfp

  • MD5

    159a7576a4bff4494528d8cd602ff470

  • SHA1

    df41076d12d6c714cdbac120acf39b1bd522f62d

  • SHA256

    45ffc05cf9e7784a2527f622f699504cf7046645956b8ee7e61501ea20ce5557

  • SHA512

    1e5774957ed0ff521dc6ed2581444e78ca5c9ab9fbd0214fd726ffa3f9160780734706c5d44d82933c2b47bf8d2d5ea22f03b9f6791b804b082610f4dd7153fd

Malware Config

Targets

    • Target

      45ffc05cf9e7784a2527f622f699504cf7046645956b8ee7e61501ea20ce5557

    • Size

      289KB

    • MD5

      159a7576a4bff4494528d8cd602ff470

    • SHA1

      df41076d12d6c714cdbac120acf39b1bd522f62d

    • SHA256

      45ffc05cf9e7784a2527f622f699504cf7046645956b8ee7e61501ea20ce5557

    • SHA512

      1e5774957ed0ff521dc6ed2581444e78ca5c9ab9fbd0214fd726ffa3f9160780734706c5d44d82933c2b47bf8d2d5ea22f03b9f6791b804b082610f4dd7153fd

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks