General

  • Target

    c50daf61c3cf4de46b7f700de43672d85db280c3f9cf79325649fcee2cc42073

  • Size

    334KB

  • Sample

    221123-m4hjzaah61

  • MD5

    aa02015594b4ffc3849720a7b9bee11a

  • SHA1

    208f576f1b2894a0c6bcc83482657f4c096d2b9f

  • SHA256

    c50daf61c3cf4de46b7f700de43672d85db280c3f9cf79325649fcee2cc42073

  • SHA512

    b769517d635b64774de325b1b85ec96b5c5f6126e3f8842bd8be866b3c207577cd31b440c7243b363f1cec92b574252fd0db956078c9601d63e12224c0a4b0fd

  • SSDEEP

    6144:SoVeYm8D//fiIA57WNQK4rZdLA3zl9esfxPVO9I2wV221Ddg:5V5m0XaIA7WNQKeXA3zl8eO+V2Ydg

Malware Config

Targets

    • Target

      c50daf61c3cf4de46b7f700de43672d85db280c3f9cf79325649fcee2cc42073

    • Size

      334KB

    • MD5

      aa02015594b4ffc3849720a7b9bee11a

    • SHA1

      208f576f1b2894a0c6bcc83482657f4c096d2b9f

    • SHA256

      c50daf61c3cf4de46b7f700de43672d85db280c3f9cf79325649fcee2cc42073

    • SHA512

      b769517d635b64774de325b1b85ec96b5c5f6126e3f8842bd8be866b3c207577cd31b440c7243b363f1cec92b574252fd0db956078c9601d63e12224c0a4b0fd

    • SSDEEP

      6144:SoVeYm8D//fiIA57WNQK4rZdLA3zl9esfxPVO9I2wV221Ddg:5V5m0XaIA7WNQKeXA3zl8eO+V2Ydg

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks