General

  • Target

    4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb

  • Size

    314KB

  • Sample

    221107-qdwwfsghe3

  • MD5

    083be4e8fc288e0cfb69a018e180bec6

  • SHA1

    f7c5398d38afcc54ab6a4c8abc52ae32d72c07aa

  • SHA256

    4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb

  • SHA512

    6a0a7e1b0ac81d2831857d23cfa34de9b297383a57bd73780cf2a17d5755b4574d7eb70fee961ba0524f6757a13f359ed5c1975fcbde826489bb27d4ae41db20

  • SSDEEP

    6144:1jIgoXtkqrh1erSAoAQrv/v9DpN/NuE9fKhL3C4RU/RqaYKK99mdNt1:h9oX6qlrI8f9D8hL3C4RkOL9O1

Malware Config

Targets

    • Target

      4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb

    • Size

      314KB

    • MD5

      083be4e8fc288e0cfb69a018e180bec6

    • SHA1

      f7c5398d38afcc54ab6a4c8abc52ae32d72c07aa

    • SHA256

      4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb

    • SHA512

      6a0a7e1b0ac81d2831857d23cfa34de9b297383a57bd73780cf2a17d5755b4574d7eb70fee961ba0524f6757a13f359ed5c1975fcbde826489bb27d4ae41db20

    • SSDEEP

      6144:1jIgoXtkqrh1erSAoAQrv/v9DpN/NuE9fKhL3C4RU/RqaYKK99mdNt1:h9oX6qlrI8f9D8hL3C4RkOL9O1

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks