General

  • Target

    88c6e8b9765435d45271ad1422a82c70760c15116f3ed32277c879bae1529eeb

  • Size

    253KB

  • Sample

    221123-t4x3zsah7t

  • MD5

    bc413cd7fb642e045f9f33847223c9bd

  • SHA1

    b861734176811d0938e7cb62225d217a86cdc7b4

  • SHA256

    88c6e8b9765435d45271ad1422a82c70760c15116f3ed32277c879bae1529eeb

  • SHA512

    3fb07c1df69b865d312df7c886ac723c4a20e562f254253594ee27bb8165ad38199d36df4e377770859df09ca6083f3adb1dc24bed9175bfb49fe32cb5566c55

  • SSDEEP

    3072:EtAcb+inTJscH6KkT0uXJOYokNbQaRP/HdyPZ39po6ybO3NVJCkt4oaFrh3kWsl/:EI2KMEOYoKG3bfybODJtvaFuzl/

Malware Config

Targets

    • Target

      88c6e8b9765435d45271ad1422a82c70760c15116f3ed32277c879bae1529eeb

    • Size

      253KB

    • MD5

      bc413cd7fb642e045f9f33847223c9bd

    • SHA1

      b861734176811d0938e7cb62225d217a86cdc7b4

    • SHA256

      88c6e8b9765435d45271ad1422a82c70760c15116f3ed32277c879bae1529eeb

    • SHA512

      3fb07c1df69b865d312df7c886ac723c4a20e562f254253594ee27bb8165ad38199d36df4e377770859df09ca6083f3adb1dc24bed9175bfb49fe32cb5566c55

    • SSDEEP

      3072:EtAcb+inTJscH6KkT0uXJOYokNbQaRP/HdyPZ39po6ybO3NVJCkt4oaFrh3kWsl/:EI2KMEOYoKG3bfybODJtvaFuzl/

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks