General

  • Target

    1fc26771866526cb19293f19ffde11fe9c833b336cc67af89160607e0f5eb5d5

  • Size

    160KB

  • Sample

    221107-tl51wahdbq

  • MD5

    0816c0b45add832e917dfe70fbd048af

  • SHA1

    522d686ebff5e9075cbc4e2c6e39869fbc8a7e50

  • SHA256

    1fc26771866526cb19293f19ffde11fe9c833b336cc67af89160607e0f5eb5d5

  • SHA512

    db80cecb7e6ac2348aebf33b33883b39b883768872bf7bdcf72736a4ef8b507b392b20356fab0e835bdbb263eb078f269cdee50c12e122fa786f11337cf933d4

  • SSDEEP

    1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3

Malware Config

Targets

    • Target

      1fc26771866526cb19293f19ffde11fe9c833b336cc67af89160607e0f5eb5d5

    • Size

      160KB

    • MD5

      0816c0b45add832e917dfe70fbd048af

    • SHA1

      522d686ebff5e9075cbc4e2c6e39869fbc8a7e50

    • SHA256

      1fc26771866526cb19293f19ffde11fe9c833b336cc67af89160607e0f5eb5d5

    • SHA512

      db80cecb7e6ac2348aebf33b33883b39b883768872bf7bdcf72736a4ef8b507b392b20356fab0e835bdbb263eb078f269cdee50c12e122fa786f11337cf933d4

    • SSDEEP

      1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks