General

  • Target

    bdc60f8dba4ac3f635896c643ee0d8bfbeff4e7e5727e2de4216ffe3a118939e

  • Size

    160KB

  • Sample

    221001-3p4rnaccc5

  • MD5

    7a5a2f811c6c8421c23b96df70af184f

  • SHA1

    5ecde63b38ba98fee01da94c36029feddc8705b7

  • SHA256

    bdc60f8dba4ac3f635896c643ee0d8bfbeff4e7e5727e2de4216ffe3a118939e

  • SHA512

    7f5c2ac40453513fa0ca9e04da7efc29d5a81e44a078ef5ba3ab38149c2964b1054c25451ac105a8f5535eb04e7619172ec65217ff6f10beedf19e6496ec1ba7

  • SSDEEP

    1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3

Malware Config

Targets

    • Target

      bdc60f8dba4ac3f635896c643ee0d8bfbeff4e7e5727e2de4216ffe3a118939e

    • Size

      160KB

    • MD5

      7a5a2f811c6c8421c23b96df70af184f

    • SHA1

      5ecde63b38ba98fee01da94c36029feddc8705b7

    • SHA256

      bdc60f8dba4ac3f635896c643ee0d8bfbeff4e7e5727e2de4216ffe3a118939e

    • SHA512

      7f5c2ac40453513fa0ca9e04da7efc29d5a81e44a078ef5ba3ab38149c2964b1054c25451ac105a8f5535eb04e7619172ec65217ff6f10beedf19e6496ec1ba7

    • SSDEEP

      1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks