General

  • Target

    106c7ff26c6ffe345b7027caf3ced2714db0e3d31fe0d459a33b74010f6cd8d6

  • Size

    35KB

  • Sample

    221123-lpmdyafd2v

  • MD5

    831b3611f33fbfb6596b75a9bd4333bd

  • SHA1

    4ea1dd3edb320d27ce08fa9018c9bda0ac99112c

  • SHA256

    106c7ff26c6ffe345b7027caf3ced2714db0e3d31fe0d459a33b74010f6cd8d6

  • SHA512

    baf701f3c5ad5b62d7295029b4601c1bfd3d2b6aad73908436925e600e5000f6015303a445d53e5cba48141a696e6bd6e771631267c6d258ce5df92ebee83b04

  • SSDEEP

    384:om32+39If+ZpIWknrBg1H1XbLLQRh02Lqqn2iBdV/02dhzo9TIiXuBcUW:V3ftI4pIWkrBUXLQPpLq7ixznopb6

Malware Config

Targets

    • Target

      106c7ff26c6ffe345b7027caf3ced2714db0e3d31fe0d459a33b74010f6cd8d6

    • Size

      35KB

    • MD5

      831b3611f33fbfb6596b75a9bd4333bd

    • SHA1

      4ea1dd3edb320d27ce08fa9018c9bda0ac99112c

    • SHA256

      106c7ff26c6ffe345b7027caf3ced2714db0e3d31fe0d459a33b74010f6cd8d6

    • SHA512

      baf701f3c5ad5b62d7295029b4601c1bfd3d2b6aad73908436925e600e5000f6015303a445d53e5cba48141a696e6bd6e771631267c6d258ce5df92ebee83b04

    • SSDEEP

      384:om32+39If+ZpIWknrBg1H1XbLLQRh02Lqqn2iBdV/02dhzo9TIiXuBcUW:V3ftI4pIWkrBUXLQPpLq7ixznopb6

    • Adds policy Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks