General

  • Target

    3696848ee6b9747701a294dc827f95594231820f38a0c1dd032630b9d746ceee

  • Size

    508KB

  • Sample

    221030-kwrfssdafr

  • MD5

    a29fd044eb6606185dfb55150db3a3b9

  • SHA1

    6f8eb11035b2ba84e1a77b092c00a2600dea0bae

  • SHA256

    3696848ee6b9747701a294dc827f95594231820f38a0c1dd032630b9d746ceee

  • SHA512

    e6e37dc1e6c02e6212ffde599bdbae7e1c791b07ecd0c01ce27f0aa3a6c2892676f60c5140494e62fd077d6fb56c2c872a3ac7b3929e0ed7b8150eae0d58cdf1

  • SSDEEP

    6144:d3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:d3xxPuFVtSdWJsuWXLGMvxsltRok/Gy

Score
10/10

Malware Config

Targets

    • Target

      3696848ee6b9747701a294dc827f95594231820f38a0c1dd032630b9d746ceee

    • Size

      508KB

    • MD5

      a29fd044eb6606185dfb55150db3a3b9

    • SHA1

      6f8eb11035b2ba84e1a77b092c00a2600dea0bae

    • SHA256

      3696848ee6b9747701a294dc827f95594231820f38a0c1dd032630b9d746ceee

    • SHA512

      e6e37dc1e6c02e6212ffde599bdbae7e1c791b07ecd0c01ce27f0aa3a6c2892676f60c5140494e62fd077d6fb56c2c872a3ac7b3929e0ed7b8150eae0d58cdf1

    • SSDEEP

      6144:d3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:d3xxPuFVtSdWJsuWXLGMvxsltRok/Gy

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks