General

  • Target

    b49c9518ccbe525941afa9f85f9bea24b1833b9b06bfdd3626b8811b3eb1bc15

  • Size

    396KB

  • Sample

    221123-hm4nnaeb43

  • MD5

    20a17e1e0b00ac8a180a673f13571a5c

  • SHA1

    0fe1ff555d5a8995383ecbb9c9bd34ee951bdf0d

  • SHA256

    b49c9518ccbe525941afa9f85f9bea24b1833b9b06bfdd3626b8811b3eb1bc15

  • SHA512

    d5f829d8b528d1c3803180a387927b92b994fcef39c23e3d967c76f8dd78b20c13937011ac069e83026fd22b5d405383ed766ca675a868af32d6287eb612c6be

  • SSDEEP

    12288:QjkArEN249AyE/rbaMct4bO2/VUO5QGKEBy6ij:LFE//Tct4bOs+MQGKcQj

Score
8/10

Malware Config

Targets

    • Target

      b49c9518ccbe525941afa9f85f9bea24b1833b9b06bfdd3626b8811b3eb1bc15

    • Size

      396KB

    • MD5

      20a17e1e0b00ac8a180a673f13571a5c

    • SHA1

      0fe1ff555d5a8995383ecbb9c9bd34ee951bdf0d

    • SHA256

      b49c9518ccbe525941afa9f85f9bea24b1833b9b06bfdd3626b8811b3eb1bc15

    • SHA512

      d5f829d8b528d1c3803180a387927b92b994fcef39c23e3d967c76f8dd78b20c13937011ac069e83026fd22b5d405383ed766ca675a868af32d6287eb612c6be

    • SSDEEP

      12288:QjkArEN249AyE/rbaMct4bO2/VUO5QGKEBy6ij:LFE//Tct4bOs+MQGKcQj

    Score
    8/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks