General

  • Target

    d547c9d1e09b1065064b144a5b64b9f004271fc198cc038f5243f4ff16a15c54

  • Size

    163KB

  • Sample

    221029-3y5ejsdbdp

  • MD5

    9296afe852c05767a0e12b1be0e0521c

  • SHA1

    4c8ab23a1bec00205bbabaa0749048bbe2b10e79

  • SHA256

    d547c9d1e09b1065064b144a5b64b9f004271fc198cc038f5243f4ff16a15c54

  • SHA512

    6953b091c0e9a78d132ea39a5acc86230bf5d6ce980fb24acee3092177302c08a6199d8a70e1a65502ee493e84f8a3375c5ba12ec260e0ce4cb1f1c4c68cd957

  • SSDEEP

    3072:4zWtRk4v85scSdXgMziUygrKdO3mQKks4xUaq:4K84vRhgMOUBrKdO36fvH

Score
10/10

Malware Config

Targets

    • Target

      d547c9d1e09b1065064b144a5b64b9f004271fc198cc038f5243f4ff16a15c54

    • Size

      163KB

    • MD5

      9296afe852c05767a0e12b1be0e0521c

    • SHA1

      4c8ab23a1bec00205bbabaa0749048bbe2b10e79

    • SHA256

      d547c9d1e09b1065064b144a5b64b9f004271fc198cc038f5243f4ff16a15c54

    • SHA512

      6953b091c0e9a78d132ea39a5acc86230bf5d6ce980fb24acee3092177302c08a6199d8a70e1a65502ee493e84f8a3375c5ba12ec260e0ce4cb1f1c4c68cd957

    • SSDEEP

      3072:4zWtRk4v85scSdXgMziUygrKdO3mQKks4xUaq:4K84vRhgMOUBrKdO36fvH

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks