General

  • Target

    0bcdfacfa765f35cf72659becd44951afe94b69374a097526b92db95cba8b344

  • Size

    508KB

  • Sample

    221106-rej4qaeeg4

  • MD5

    0d69c82beb7884c7bafb184207f10823

  • SHA1

    05b19285940060ad1fa6d6747b3f190efff8f84d

  • SHA256

    0bcdfacfa765f35cf72659becd44951afe94b69374a097526b92db95cba8b344

  • SHA512

    0a99a72f72407bc5d36770916662c12761f6b5edc6546b4a6187b05b7b6629bde549720e2c8731791d80901022d32c7735c7c2cebc9ba60aca802277d5737c06

  • SSDEEP

    6144:r3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:r3xxPuFVtSdWJsuWXLGMvxsltRok/Gy

Score
10/10

Malware Config

Targets

    • Target

      0bcdfacfa765f35cf72659becd44951afe94b69374a097526b92db95cba8b344

    • Size

      508KB

    • MD5

      0d69c82beb7884c7bafb184207f10823

    • SHA1

      05b19285940060ad1fa6d6747b3f190efff8f84d

    • SHA256

      0bcdfacfa765f35cf72659becd44951afe94b69374a097526b92db95cba8b344

    • SHA512

      0a99a72f72407bc5d36770916662c12761f6b5edc6546b4a6187b05b7b6629bde549720e2c8731791d80901022d32c7735c7c2cebc9ba60aca802277d5737c06

    • SSDEEP

      6144:r3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:r3xxPuFVtSdWJsuWXLGMvxsltRok/Gy

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks