General

  • Target

    06e2b6c08a029049a3482e4d299582efbcda7c4c216272ed5c56d448d019aaeb

  • Size

    520KB

  • Sample

    221020-2e3k6shccq

  • MD5

    646669ef10b15d2eac4af06fc1b328d0

  • SHA1

    0a166656b4768f09f52c619a776c9ca29f2b3f08

  • SHA256

    06e2b6c08a029049a3482e4d299582efbcda7c4c216272ed5c56d448d019aaeb

  • SHA512

    6be7d6e203c0f6772da46cb920ba8799d4758c57bdec9a72d11349533dc248b72189d4b2a31991d0656354088b08d77db55f4f76bbc67a4aacb96cf1ed29f424

  • SSDEEP

    12288:jL5GA6wigctwxaJOri8KuMhEAF/Lc0CTbkwnj3Zz:H5KwTIzJSPK/hHjXoBj3Zz

Score
10/10

Malware Config

Targets

    • Target

      06e2b6c08a029049a3482e4d299582efbcda7c4c216272ed5c56d448d019aaeb

    • Size

      520KB

    • MD5

      646669ef10b15d2eac4af06fc1b328d0

    • SHA1

      0a166656b4768f09f52c619a776c9ca29f2b3f08

    • SHA256

      06e2b6c08a029049a3482e4d299582efbcda7c4c216272ed5c56d448d019aaeb

    • SHA512

      6be7d6e203c0f6772da46cb920ba8799d4758c57bdec9a72d11349533dc248b72189d4b2a31991d0656354088b08d77db55f4f76bbc67a4aacb96cf1ed29f424

    • SSDEEP

      12288:jL5GA6wigctwxaJOri8KuMhEAF/Lc0CTbkwnj3Zz:H5KwTIzJSPK/hHjXoBj3Zz

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks