General

  • Target

    d3916e1f14d4b87efe8ca9a7a53e7f0bf5ccf8f3888c7c865fd3f77bc955f9b5

  • Size

    160KB

  • Sample

    221004-dz7hvsagdl

  • MD5

    30ff3acd8f481f7be4c9e4e6341af425

  • SHA1

    87eb5cad82a764e07c690f93aff6fdd6aa6b070d

  • SHA256

    d3916e1f14d4b87efe8ca9a7a53e7f0bf5ccf8f3888c7c865fd3f77bc955f9b5

  • SHA512

    4f1e5c7b1ce0871b809ef095119360bf8343606ccc6118872b92db86d1e3014edbcf1ca0cadc3980beaa16deec458250a6b3562e551cbe78f1d95872d301edf6

  • SSDEEP

    1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3

Malware Config

Targets

    • Target

      d3916e1f14d4b87efe8ca9a7a53e7f0bf5ccf8f3888c7c865fd3f77bc955f9b5

    • Size

      160KB

    • MD5

      30ff3acd8f481f7be4c9e4e6341af425

    • SHA1

      87eb5cad82a764e07c690f93aff6fdd6aa6b070d

    • SHA256

      d3916e1f14d4b87efe8ca9a7a53e7f0bf5ccf8f3888c7c865fd3f77bc955f9b5

    • SHA512

      4f1e5c7b1ce0871b809ef095119360bf8343606ccc6118872b92db86d1e3014edbcf1ca0cadc3980beaa16deec458250a6b3562e551cbe78f1d95872d301edf6

    • SSDEEP

      1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks