General

  • Target

    ca29c95370adc8897660104db605b360ab953ad2330c6c336dfac3deb260147b

  • Size

    111KB

  • Sample

    221001-zjwbjseha6

  • MD5

    0a9dfe5f60f2c99508cacd9261b62b25

  • SHA1

    b89b32f1cbfb9d6040c00131d65fa3cd03a5ffa8

  • SHA256

    ca29c95370adc8897660104db605b360ab953ad2330c6c336dfac3deb260147b

  • SHA512

    348a259755b7107bb4f38198f0f3b35877587f603e9540774da9b11fbb5db58035fce9b8d2fae33109d452080fbb99b77980c1c3221d4991ea1942049d7ade8b

  • SSDEEP

    3072:u0v4Yb2eruGgAaeXWhTj+feuCL0ov7jG8Cy/ecX:Jvrb22uGLbWhTjYeuvgew

Malware Config

Targets

    • Target

      ca29c95370adc8897660104db605b360ab953ad2330c6c336dfac3deb260147b

    • Size

      111KB

    • MD5

      0a9dfe5f60f2c99508cacd9261b62b25

    • SHA1

      b89b32f1cbfb9d6040c00131d65fa3cd03a5ffa8

    • SHA256

      ca29c95370adc8897660104db605b360ab953ad2330c6c336dfac3deb260147b

    • SHA512

      348a259755b7107bb4f38198f0f3b35877587f603e9540774da9b11fbb5db58035fce9b8d2fae33109d452080fbb99b77980c1c3221d4991ea1942049d7ade8b

    • SSDEEP

      3072:u0v4Yb2eruGgAaeXWhTj+feuCL0ov7jG8Cy/ecX:Jvrb22uGLbWhTjYeuvgew

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand microsoft.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks