General

  • Target

    43569708e78349db38e8ba60564cf322b21109efe6fde4268d850f857e87cbec

  • Size

    913KB

  • Sample

    221030-qdpgdabhb9

  • MD5

    a26ebd2707c2addae45d7303f3707870

  • SHA1

    5e92e66b69d3ca4ad58ecbac4c74d945f4fa381c

  • SHA256

    43569708e78349db38e8ba60564cf322b21109efe6fde4268d850f857e87cbec

  • SHA512

    39c1839debfb588b9b6e95dbcb1a2f2af827ea46669e54302bfb56db3ee60301eebb4040afdc765ed97870c584a085dd20da96e063755f9537ffe0e5f75cba60

  • SSDEEP

    6144:p9JUm2y14qmQJqapPTJfk2PHnxS8VDJiNzYiAOMn:HJLmQJxJfk2fxVJuK

Malware Config

Targets

    • Target

      43569708e78349db38e8ba60564cf322b21109efe6fde4268d850f857e87cbec

    • Size

      913KB

    • MD5

      a26ebd2707c2addae45d7303f3707870

    • SHA1

      5e92e66b69d3ca4ad58ecbac4c74d945f4fa381c

    • SHA256

      43569708e78349db38e8ba60564cf322b21109efe6fde4268d850f857e87cbec

    • SHA512

      39c1839debfb588b9b6e95dbcb1a2f2af827ea46669e54302bfb56db3ee60301eebb4040afdc765ed97870c584a085dd20da96e063755f9537ffe0e5f75cba60

    • SSDEEP

      6144:p9JUm2y14qmQJqapPTJfk2PHnxS8VDJiNzYiAOMn:HJLmQJxJfk2fxVJuK

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks