General

  • Target

    91a3769dae67cd7371b901fe90fffbba4a7a1b3a2f7b3b6d0a0447c89eef0394

  • Size

    160KB

  • Sample

    221011-ldxersgab9

  • MD5

    75ec1b7d008a62991bb5c7b27ccb4760

  • SHA1

    fc9a6bca9429725461f9c6006b78dd38a04d7061

  • SHA256

    91a3769dae67cd7371b901fe90fffbba4a7a1b3a2f7b3b6d0a0447c89eef0394

  • SHA512

    e08ce5a887383cd8d1966def7b2c85047411967a5527feb28f33f56a1a7878e7f79b099da2d115724af17575c8c1761125974d6cca551250b4d9f23348fc87d9

  • SSDEEP

    1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3

Malware Config

Targets

    • Target

      91a3769dae67cd7371b901fe90fffbba4a7a1b3a2f7b3b6d0a0447c89eef0394

    • Size

      160KB

    • MD5

      75ec1b7d008a62991bb5c7b27ccb4760

    • SHA1

      fc9a6bca9429725461f9c6006b78dd38a04d7061

    • SHA256

      91a3769dae67cd7371b901fe90fffbba4a7a1b3a2f7b3b6d0a0447c89eef0394

    • SHA512

      e08ce5a887383cd8d1966def7b2c85047411967a5527feb28f33f56a1a7878e7f79b099da2d115724af17575c8c1761125974d6cca551250b4d9f23348fc87d9

    • SSDEEP

      1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks