General

  • Target

    2c6851404f054c64c9b58fcfd1d5f9c08dbc62cb7e4bd57105f6156748614d0b

  • Size

    508KB

  • Sample

    221011-gd9mwagfb9

  • MD5

    6e2016d252f924c88f55dfb62ee505b0

  • SHA1

    4249aecbab4787afcb77193b158f41dabd13756e

  • SHA256

    2c6851404f054c64c9b58fcfd1d5f9c08dbc62cb7e4bd57105f6156748614d0b

  • SHA512

    adaa39ab515442937b84f09c56b402d815a81f3a3a7fdd2354ed723c4dd0cc290dfc3e6feb0629827fb082c73bda59353cd628702b797b805adc5cb72c6787ca

  • SSDEEP

    6144:I3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:I3xxPuFVtSdWJsuWXLGMvxsltRok/Gy

Score
10/10

Malware Config

Targets

    • Target

      2c6851404f054c64c9b58fcfd1d5f9c08dbc62cb7e4bd57105f6156748614d0b

    • Size

      508KB

    • MD5

      6e2016d252f924c88f55dfb62ee505b0

    • SHA1

      4249aecbab4787afcb77193b158f41dabd13756e

    • SHA256

      2c6851404f054c64c9b58fcfd1d5f9c08dbc62cb7e4bd57105f6156748614d0b

    • SHA512

      adaa39ab515442937b84f09c56b402d815a81f3a3a7fdd2354ed723c4dd0cc290dfc3e6feb0629827fb082c73bda59353cd628702b797b805adc5cb72c6787ca

    • SSDEEP

      6144:I3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:I3xxPuFVtSdWJsuWXLGMvxsltRok/Gy

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks