General

  • Target

    95c75d46ca189ee970ca03e94e9cdac2a868416d6b0a9861cb5665d32b53068e

  • Size

    160KB

  • Sample

    221002-ssqn4acdb4

  • MD5

    519e049dd542372c1c5e8264e2d20b20

  • SHA1

    25262433a581e17b2625b4ad0e11f89f307d5b9a

  • SHA256

    95c75d46ca189ee970ca03e94e9cdac2a868416d6b0a9861cb5665d32b53068e

  • SHA512

    27e77b99bd9b75fb6b707ff3f9a34733282a3e11cb9a5ea0d04ab9f547d35cfa4c35ff84c9d17ecdb907155cf383bb07073495a15e768cf05efe9393e586daf4

  • SSDEEP

    1536:3+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:3xbkuVbvLn7Uj3

Malware Config

Targets

    • Target

      95c75d46ca189ee970ca03e94e9cdac2a868416d6b0a9861cb5665d32b53068e

    • Size

      160KB

    • MD5

      519e049dd542372c1c5e8264e2d20b20

    • SHA1

      25262433a581e17b2625b4ad0e11f89f307d5b9a

    • SHA256

      95c75d46ca189ee970ca03e94e9cdac2a868416d6b0a9861cb5665d32b53068e

    • SHA512

      27e77b99bd9b75fb6b707ff3f9a34733282a3e11cb9a5ea0d04ab9f547d35cfa4c35ff84c9d17ecdb907155cf383bb07073495a15e768cf05efe9393e586daf4

    • SSDEEP

      1536:3+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:3xbkuVbvLn7Uj3

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks