General

  • Target

    5f594f342b2efe9e3583b85332ed5f4337ba2a47be66b6beec0183f2819efc7e

  • Size

    284KB

  • Sample

    221003-1ww92shce8

  • MD5

    05ae138e80fad71daac8b2dd947928a0

  • SHA1

    295b592dcd5cdc55c3b9b6408dfd9ba48db81cc5

  • SHA256

    5f594f342b2efe9e3583b85332ed5f4337ba2a47be66b6beec0183f2819efc7e

  • SHA512

    b04c66d54b354b44d74aa91c7c44c0ecf84986a4f948815c24d7311cc5d9f1b3cf784db73bb613cda767bed4910f376c2593f317fa37e1c95e42d5a370875d4a

  • SSDEEP

    3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l

Score
8/10

Malware Config

Targets

    • Target

      5f594f342b2efe9e3583b85332ed5f4337ba2a47be66b6beec0183f2819efc7e

    • Size

      284KB

    • MD5

      05ae138e80fad71daac8b2dd947928a0

    • SHA1

      295b592dcd5cdc55c3b9b6408dfd9ba48db81cc5

    • SHA256

      5f594f342b2efe9e3583b85332ed5f4337ba2a47be66b6beec0183f2819efc7e

    • SHA512

      b04c66d54b354b44d74aa91c7c44c0ecf84986a4f948815c24d7311cc5d9f1b3cf784db73bb613cda767bed4910f376c2593f317fa37e1c95e42d5a370875d4a

    • SSDEEP

      3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l

    Score
    8/10
    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks