General

  • Target

    59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0

  • Size

    1.6MB

  • Sample

    220724-cv9a8abfdn

  • MD5

    8ba75de55191a7b284c87450d7ec168e

  • SHA1

    e8c1481d0a26713f92ef785b8fd998fdd87198c6

  • SHA256

    59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0

  • SHA512

    1af991aa7a4ec227ab38df95a0f8a0ef1ab6cd84dd7100718de088e00cd8f4e3d545d3dd4ee40e619f246edf7ec23e6c44b195e57242536c11e22aff6799731d

Malware Config

Targets

    • Target

      59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0

    • Size

      1.6MB

    • MD5

      8ba75de55191a7b284c87450d7ec168e

    • SHA1

      e8c1481d0a26713f92ef785b8fd998fdd87198c6

    • SHA256

      59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0

    • SHA512

      1af991aa7a4ec227ab38df95a0f8a0ef1ab6cd84dd7100718de088e00cd8f4e3d545d3dd4ee40e619f246edf7ec23e6c44b195e57242536c11e22aff6799731d

    • suricata: ET MALWARE W32/Dinwod.Dropper Win32/Xtrat.B CnC Beacon

      suricata: ET MALWARE W32/Dinwod.Dropper Win32/Xtrat.B CnC Beacon

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks