General

  • Target

    5c4157fd1ff2a7f8b6ae6af978594e314783d4d7e94bd3099915f2615c1dc8e1

  • Size

    142KB

  • Sample

    221002-aqgz3adeg3

  • MD5

    771b3095732a10c6ec7ab4a06bcbb680

  • SHA1

    6219903209ff28e67c482f23ec588f5ed317e881

  • SHA256

    5c4157fd1ff2a7f8b6ae6af978594e314783d4d7e94bd3099915f2615c1dc8e1

  • SHA512

    b22edee6d53a0d07e7fb791f2065ebb46279e9bc9536772bfc506093085c3ade9fb57636b53c7a616e8b7134f9e945dcecf581627389ca1f3c889eef55cea4cf

  • SSDEEP

    3072:BHNbK7Z3QRnmkcgPIT5UKMfVg5lEFOPIQHSVK4CbmaA:dpK7ynjZuUtfV+lIOPp4CbY

Score
10/10

Malware Config

Targets

    • Target

      5c4157fd1ff2a7f8b6ae6af978594e314783d4d7e94bd3099915f2615c1dc8e1

    • Size

      142KB

    • MD5

      771b3095732a10c6ec7ab4a06bcbb680

    • SHA1

      6219903209ff28e67c482f23ec588f5ed317e881

    • SHA256

      5c4157fd1ff2a7f8b6ae6af978594e314783d4d7e94bd3099915f2615c1dc8e1

    • SHA512

      b22edee6d53a0d07e7fb791f2065ebb46279e9bc9536772bfc506093085c3ade9fb57636b53c7a616e8b7134f9e945dcecf581627389ca1f3c889eef55cea4cf

    • SSDEEP

      3072:BHNbK7Z3QRnmkcgPIT5UKMfVg5lEFOPIQHSVK4CbmaA:dpK7ynjZuUtfV+lIOPp4CbY

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks