General

  • Target

    5472026f809e1ee1b4da6ac9da3f296a8e6ac994879964ce94d1fd16cfd60326

  • Size

    304KB

  • Sample

    221107-tk28lahcfl

  • MD5

    078985dde71f61a2e9bebf045c9e6df0

  • SHA1

    89de7f864505e68994e1f64a288db9f1e0778862

  • SHA256

    5472026f809e1ee1b4da6ac9da3f296a8e6ac994879964ce94d1fd16cfd60326

  • SHA512

    794c6c7b4e1b1faf92a5f05ddba37d4c5986b2b3a08d8422ff7b90d3794b772426b97ea18f051808db833ccd3c4b3cedf752b7eea55170588d84e545fdd4f450

  • SSDEEP

    3072:ZIDNcIFN3tw4QfwmAOMe6UJbVM/vkA9OQzY6eCFs5Juh2v19hlDcfbEdp7uxEo+i:qJigOTJXYOaFs5Juh819hqkuGh2LeyI

Malware Config

Targets

    • Target

      5472026f809e1ee1b4da6ac9da3f296a8e6ac994879964ce94d1fd16cfd60326

    • Size

      304KB

    • MD5

      078985dde71f61a2e9bebf045c9e6df0

    • SHA1

      89de7f864505e68994e1f64a288db9f1e0778862

    • SHA256

      5472026f809e1ee1b4da6ac9da3f296a8e6ac994879964ce94d1fd16cfd60326

    • SHA512

      794c6c7b4e1b1faf92a5f05ddba37d4c5986b2b3a08d8422ff7b90d3794b772426b97ea18f051808db833ccd3c4b3cedf752b7eea55170588d84e545fdd4f450

    • SSDEEP

      3072:ZIDNcIFN3tw4QfwmAOMe6UJbVM/vkA9OQzY6eCFs5Juh2v19hlDcfbEdp7uxEo+i:qJigOTJXYOaFs5Juh819hqkuGh2LeyI

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks