General

  • Target

    2d98caafdd7a9ba2bfb7c62f16aac38afe0c5dd2f450815437fd96cb7202c018

  • Size

    140KB

  • Sample

    221011-y5z17adadr

  • MD5

    65009196600dc17791c3ad0472f31666

  • SHA1

    0297ea08f494ea33d3510fffa5ab82de58834e26

  • SHA256

    2d98caafdd7a9ba2bfb7c62f16aac38afe0c5dd2f450815437fd96cb7202c018

  • SHA512

    d599ce5a671169fa6c621dc3ed86f453d542de198c6d1db56f0a78a6f754443d04c68e15928baa623564ba95b802f3c7bb1696d4b49a0abb7bb3ef62e199cbf0

  • SSDEEP

    3072:4DGcSl/JPrpCa5DcvgO0gFI/TGoUpKV7Oa4smwlc:ncSZJPrpDMAZUpKG

Score
10/10

Malware Config

Targets

    • Target

      2d98caafdd7a9ba2bfb7c62f16aac38afe0c5dd2f450815437fd96cb7202c018

    • Size

      140KB

    • MD5

      65009196600dc17791c3ad0472f31666

    • SHA1

      0297ea08f494ea33d3510fffa5ab82de58834e26

    • SHA256

      2d98caafdd7a9ba2bfb7c62f16aac38afe0c5dd2f450815437fd96cb7202c018

    • SHA512

      d599ce5a671169fa6c621dc3ed86f453d542de198c6d1db56f0a78a6f754443d04c68e15928baa623564ba95b802f3c7bb1696d4b49a0abb7bb3ef62e199cbf0

    • SSDEEP

      3072:4DGcSl/JPrpCa5DcvgO0gFI/TGoUpKV7Oa4smwlc:ncSZJPrpDMAZUpKG

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks