General

  • Target

    b4650e697544f34af3bf3413fba0fedb874f843c6a515cc03bfafe8c282b8d08

  • Size

    124KB

  • Sample

    221107-zhcstaahhm

  • MD5

    0ac1895f54e87ac3941b62975fef75ff

  • SHA1

    7ab16e3dd7ae8183329b33a2cb3b2752f232b6f5

  • SHA256

    b4650e697544f34af3bf3413fba0fedb874f843c6a515cc03bfafe8c282b8d08

  • SHA512

    a223b218db5b5ceadd6f99dd93292fef3472c5a40e10bcf5fd5b9a0a720de5dcf2f6c16776c24bc2aa477bd3ad7888b372b92c30442961fc8051d5a9d7ee9e0d

  • SSDEEP

    3072:ng6msFsIoXWzovRV9o5dY8bCss4oeHqHpOcdElGIrGMPM:gCsIzo39o5+8lk

Score
10/10

Malware Config

Targets

    • Target

      b4650e697544f34af3bf3413fba0fedb874f843c6a515cc03bfafe8c282b8d08

    • Size

      124KB

    • MD5

      0ac1895f54e87ac3941b62975fef75ff

    • SHA1

      7ab16e3dd7ae8183329b33a2cb3b2752f232b6f5

    • SHA256

      b4650e697544f34af3bf3413fba0fedb874f843c6a515cc03bfafe8c282b8d08

    • SHA512

      a223b218db5b5ceadd6f99dd93292fef3472c5a40e10bcf5fd5b9a0a720de5dcf2f6c16776c24bc2aa477bd3ad7888b372b92c30442961fc8051d5a9d7ee9e0d

    • SSDEEP

      3072:ng6msFsIoXWzovRV9o5dY8bCss4oeHqHpOcdElGIrGMPM:gCsIzo39o5+8lk

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks