General

  • Target

    0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f

  • Size

    284KB

  • Sample

    221018-dhjqgaebg3

  • MD5

    bda317186134c0564290f2c3a9040f4d

  • SHA1

    88907b0dd91e826359eec729de5cd13dc68fa1f0

  • SHA256

    0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f

  • SHA512

    cda85f83978c0a7f972ee767405975c29acf8e8c9d8fe66bd3b9560e973c3eaa4fe996d2edfdbd99e6ae375fd27495a6af41ed76d04bfe72ec99913866c68b00

  • SSDEEP

    3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l

Score
8/10

Malware Config

Targets

    • Target

      0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f

    • Size

      284KB

    • MD5

      bda317186134c0564290f2c3a9040f4d

    • SHA1

      88907b0dd91e826359eec729de5cd13dc68fa1f0

    • SHA256

      0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f

    • SHA512

      cda85f83978c0a7f972ee767405975c29acf8e8c9d8fe66bd3b9560e973c3eaa4fe996d2edfdbd99e6ae375fd27495a6af41ed76d04bfe72ec99913866c68b00

    • SSDEEP

      3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l

    Score
    8/10
    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks