General

  • Target

    f38e002de598e2c9edc69ed6333479ca2479a721ac7459219cfb43c124572063

  • Size

    1004KB

  • Sample

    221020-xx377sbae6

  • MD5

    9064bfc5f171c596a43ab747130a73f0

  • SHA1

    6239b5fe881657ae9a084fb2644bf5ee1aed5390

  • SHA256

    f38e002de598e2c9edc69ed6333479ca2479a721ac7459219cfb43c124572063

  • SHA512

    fd580a40df68c7c308b3da3345ef6832a7d66e10cc2396e5489e76ab2b0ee1aed55c42f6ffa9801d08016b5b248af18a81ae12820a0b41276a503b5a4a38c33a

  • SSDEEP

    12288:XNGtL/dB9R+PuPbp+UFGyzL2CE2rspPjzhGuk6:XNAL/jj0UF1nyfpPjzhY6

Malware Config

Targets

    • Target

      f38e002de598e2c9edc69ed6333479ca2479a721ac7459219cfb43c124572063

    • Size

      1004KB

    • MD5

      9064bfc5f171c596a43ab747130a73f0

    • SHA1

      6239b5fe881657ae9a084fb2644bf5ee1aed5390

    • SHA256

      f38e002de598e2c9edc69ed6333479ca2479a721ac7459219cfb43c124572063

    • SHA512

      fd580a40df68c7c308b3da3345ef6832a7d66e10cc2396e5489e76ab2b0ee1aed55c42f6ffa9801d08016b5b248af18a81ae12820a0b41276a503b5a4a38c33a

    • SSDEEP

      12288:XNGtL/dB9R+PuPbp+UFGyzL2CE2rspPjzhGuk6:XNAL/jj0UF1nyfpPjzhY6

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks