General

  • Target

    0e7ec1bea5215c79e32d9a25412c14b9a50bf2c1af2268b8b0808a2e9ac2ea06

  • Size

    421KB

  • Sample

    221019-xrr8radddk

  • MD5

    ee0b1b06f242211289cfd0990da7c6e1

  • SHA1

    11dd2a700f68d712d0e6d3700b845ebe73c0ff84

  • SHA256

    0e7ec1bea5215c79e32d9a25412c14b9a50bf2c1af2268b8b0808a2e9ac2ea06

  • SHA512

    99652d2a7d15730436f4df5b3229264bac534a5d90406bf403a022e3b6ae91e6b5ed7d406174cb349c56fcb3c78cda6d26fdbeea6d05b6d5504f76c561c216c6

  • SSDEEP

    12288:KxAA+8PBV378FE+2VSBnr5IssZFBV84de+g:KeJ8PvIe7SBnr5fune+g

Score
8/10

Malware Config

Targets

    • Target

      0e7ec1bea5215c79e32d9a25412c14b9a50bf2c1af2268b8b0808a2e9ac2ea06

    • Size

      421KB

    • MD5

      ee0b1b06f242211289cfd0990da7c6e1

    • SHA1

      11dd2a700f68d712d0e6d3700b845ebe73c0ff84

    • SHA256

      0e7ec1bea5215c79e32d9a25412c14b9a50bf2c1af2268b8b0808a2e9ac2ea06

    • SHA512

      99652d2a7d15730436f4df5b3229264bac534a5d90406bf403a022e3b6ae91e6b5ed7d406174cb349c56fcb3c78cda6d26fdbeea6d05b6d5504f76c561c216c6

    • SSDEEP

      12288:KxAA+8PBV378FE+2VSBnr5IssZFBV84de+g:KeJ8PvIe7SBnr5fune+g

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks