General

  • Target

    73a0e359b32f6a54d94df5c9632de81d6497e2eac12e310971acb37f6c4aa60e

  • Size

    156KB

  • Sample

    221019-spk97sdcg8

  • MD5

    a0be4fdcddcb42e0f64be1c266995fa0

  • SHA1

    0379f37204d889a4f07c27bbdd8b18fe3446b0ca

  • SHA256

    73a0e359b32f6a54d94df5c9632de81d6497e2eac12e310971acb37f6c4aa60e

  • SHA512

    100e27f54aa9a1b8b17acdbeb686f908a970c1ae7d557d2880eebadc480f4f9a89958dcd8c2c4fe6e116a184e7c5217c464778baa2e7d496b7bf0d6f5766c7b0

  • SSDEEP

    3072:AiOiZFK+X1FVYQ9ZX3qOnsK27Tl0BaNSYD6h:eSXj9LHPk7p0BaNSYY

Score
10/10

Malware Config

Targets

    • Target

      73a0e359b32f6a54d94df5c9632de81d6497e2eac12e310971acb37f6c4aa60e

    • Size

      156KB

    • MD5

      a0be4fdcddcb42e0f64be1c266995fa0

    • SHA1

      0379f37204d889a4f07c27bbdd8b18fe3446b0ca

    • SHA256

      73a0e359b32f6a54d94df5c9632de81d6497e2eac12e310971acb37f6c4aa60e

    • SHA512

      100e27f54aa9a1b8b17acdbeb686f908a970c1ae7d557d2880eebadc480f4f9a89958dcd8c2c4fe6e116a184e7c5217c464778baa2e7d496b7bf0d6f5766c7b0

    • SSDEEP

      3072:AiOiZFK+X1FVYQ9ZX3qOnsK27Tl0BaNSYD6h:eSXj9LHPk7p0BaNSYY

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks