General

  • Target

    93c32e945d331f8ee4acda55736441ca6d7f3b707413dea6663e4838ecee0500

  • Size

    160KB

  • Sample

    221004-d1akhsagdq

  • MD5

    342a5988e4ad3a6675d0f7d8184228c6

  • SHA1

    1a39054d9592ad84f2d9350bdf8b8875bab58f25

  • SHA256

    93c32e945d331f8ee4acda55736441ca6d7f3b707413dea6663e4838ecee0500

  • SHA512

    95855fda9cf121079cf97f70e8b111005b8a7bbd5f91140f582a0eede55387941ea1bd1c8988f96fb2efc8ec65b4c8b9c314afcb43c8c835e27b646187a0be78

  • SSDEEP

    1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3

Malware Config

Targets

    • Target

      93c32e945d331f8ee4acda55736441ca6d7f3b707413dea6663e4838ecee0500

    • Size

      160KB

    • MD5

      342a5988e4ad3a6675d0f7d8184228c6

    • SHA1

      1a39054d9592ad84f2d9350bdf8b8875bab58f25

    • SHA256

      93c32e945d331f8ee4acda55736441ca6d7f3b707413dea6663e4838ecee0500

    • SHA512

      95855fda9cf121079cf97f70e8b111005b8a7bbd5f91140f582a0eede55387941ea1bd1c8988f96fb2efc8ec65b4c8b9c314afcb43c8c835e27b646187a0be78

    • SSDEEP

      1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks