General

  • Target

    71ef7a129343b1b9297adb081a73650f84acbdc7fb73b0fe818caefee24531d3

  • Size

    508KB

  • Sample

    221106-recpmsggan

  • MD5

    2cb8bdf864ce99facaa0f0c1c4034c46

  • SHA1

    4ea6ded19e4ad971855b48b835ebd319e8975114

  • SHA256

    71ef7a129343b1b9297adb081a73650f84acbdc7fb73b0fe818caefee24531d3

  • SHA512

    cd89fd054830bd2377ba12399ff93f898d3d910452ae90ffa0055e14f13d37baa49cfc848cc04a134c78384a499eff89654bb71fcd13add199c26c169d1bc3c2

  • SSDEEP

    6144:L3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:L3xxPuFVtSdWJsuWXLGMvxsltRok/Gy

Score
10/10

Malware Config

Targets

    • Target

      71ef7a129343b1b9297adb081a73650f84acbdc7fb73b0fe818caefee24531d3

    • Size

      508KB

    • MD5

      2cb8bdf864ce99facaa0f0c1c4034c46

    • SHA1

      4ea6ded19e4ad971855b48b835ebd319e8975114

    • SHA256

      71ef7a129343b1b9297adb081a73650f84acbdc7fb73b0fe818caefee24531d3

    • SHA512

      cd89fd054830bd2377ba12399ff93f898d3d910452ae90ffa0055e14f13d37baa49cfc848cc04a134c78384a499eff89654bb71fcd13add199c26c169d1bc3c2

    • SSDEEP

      6144:L3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:L3xxPuFVtSdWJsuWXLGMvxsltRok/Gy

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks