General

  • Target

    73ce7739313a6223e66ebcecb1ab11405e8b9d48d3594c34ab97fefed5322d8a

  • Size

    29KB

  • Sample

    220725-d7kztsdcgn

  • MD5

    5663ffc39db0dc4db347f445d1ea8b14

  • SHA1

    6fc9e7f024ca824ae533aac845d56dca2f2c23fd

  • SHA256

    73ce7739313a6223e66ebcecb1ab11405e8b9d48d3594c34ab97fefed5322d8a

  • SHA512

    9c443603b4fa68842d6b07e330868caa03314b3d1fa76dceb8de636f60547d61d0b85db10b35a71c51ee3ddaa2cf15ac31dd3dc32cf16f12e109661ed6123d1a

Score
10/10

Malware Config

Targets

    • Target

      73ce7739313a6223e66ebcecb1ab11405e8b9d48d3594c34ab97fefed5322d8a

    • Size

      29KB

    • MD5

      5663ffc39db0dc4db347f445d1ea8b14

    • SHA1

      6fc9e7f024ca824ae533aac845d56dca2f2c23fd

    • SHA256

      73ce7739313a6223e66ebcecb1ab11405e8b9d48d3594c34ab97fefed5322d8a

    • SHA512

      9c443603b4fa68842d6b07e330868caa03314b3d1fa76dceb8de636f60547d61d0b85db10b35a71c51ee3ddaa2cf15ac31dd3dc32cf16f12e109661ed6123d1a

    Score
    10/10
    • suricata: ET MALWARE Common Upatre Header Structure 2

      suricata: ET MALWARE Common Upatre Header Structure 2

    • suricata: ET MALWARE Downloader (P2P Zeus dropper UA)

      suricata: ET MALWARE Downloader (P2P Zeus dropper UA)

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks