General

  • Target

    59ef7c08cb5e4d2ab22e440df3b62ce995d1278ea0d6bdf7201562d6bb3e2bb8

  • Size

    196KB

  • Sample

    220724-cttjdabfb3

  • MD5

    63bc0d485054f38c262abeb30fcfff9a

  • SHA1

    3d92b019053367cd7dcd30b69b380da6954dcd3d

  • SHA256

    59ef7c08cb5e4d2ab22e440df3b62ce995d1278ea0d6bdf7201562d6bb3e2bb8

  • SHA512

    3d9d754a8148a3da8c2fb73c02f796425707188a13b5bd370674f437c4f0595f72b40c6a8a62f72459290195a7c2e7401948b17b7d2b54d557c1e689c95b9457

Malware Config

Targets

    • Target

      59ef7c08cb5e4d2ab22e440df3b62ce995d1278ea0d6bdf7201562d6bb3e2bb8

    • Size

      196KB

    • MD5

      63bc0d485054f38c262abeb30fcfff9a

    • SHA1

      3d92b019053367cd7dcd30b69b380da6954dcd3d

    • SHA256

      59ef7c08cb5e4d2ab22e440df3b62ce995d1278ea0d6bdf7201562d6bb3e2bb8

    • SHA512

      3d9d754a8148a3da8c2fb73c02f796425707188a13b5bd370674f437c4f0595f72b40c6a8a62f72459290195a7c2e7401948b17b7d2b54d557c1e689c95b9457

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Deletes itself

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks