General

  • Target

    70bb37aed4406a1fd15a466095198b562da388a9525e5f6bc6c899ab2b9e9eb8

  • Size

    211KB

  • Sample

    221123-vd57cabf91

  • MD5

    3f68886e4974aa2cda27e7ebd4577488

  • SHA1

    a21326daa72e09db39a61c13258adb9737deac0e

  • SHA256

    70bb37aed4406a1fd15a466095198b562da388a9525e5f6bc6c899ab2b9e9eb8

  • SHA512

    7f4e262847795f5371823b1bf5dbcf461774382d03dc8c653fba7b9261a4bbc55c778101e93f20241b41add223d3ed8cddbae3a80c980a846893a3a506f0d732

  • SSDEEP

    3072:WfJ4pUdCdc0E+/tYByANc/sg1WyQmG07nMzHrscxO9xEtobhlL5WN:WfJ4GCdlEQtGaWcGQiLnxO9xEto9lu

Malware Config

Targets

    • Target

      70bb37aed4406a1fd15a466095198b562da388a9525e5f6bc6c899ab2b9e9eb8

    • Size

      211KB

    • MD5

      3f68886e4974aa2cda27e7ebd4577488

    • SHA1

      a21326daa72e09db39a61c13258adb9737deac0e

    • SHA256

      70bb37aed4406a1fd15a466095198b562da388a9525e5f6bc6c899ab2b9e9eb8

    • SHA512

      7f4e262847795f5371823b1bf5dbcf461774382d03dc8c653fba7b9261a4bbc55c778101e93f20241b41add223d3ed8cddbae3a80c980a846893a3a506f0d732

    • SSDEEP

      3072:WfJ4pUdCdc0E+/tYByANc/sg1WyQmG07nMzHrscxO9xEtobhlL5WN:WfJ4GCdlEQtGaWcGQiLnxO9xEto9lu

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks