General

  • Target

    d4c6cab691f3298f9385f533fb162e1a8aed949776254c0fd26ed3a4d27a0640

  • Size

    124KB

  • Sample

    221123-vne3xahe39

  • MD5

    56c42d55c7d3632b8c69cff344650d11

  • SHA1

    1a439553fe95c6b7a3183d8a7d4c6857a8dbdb69

  • SHA256

    d4c6cab691f3298f9385f533fb162e1a8aed949776254c0fd26ed3a4d27a0640

  • SHA512

    04f74fbee0e1f2c55f94f675bca5dbc515a7f3da0b9520d00aa38ab01b6078945bc040dc2855d9a4cee82b2f7b5f9c62934cfef6437c515ab5f9e3d30eb8af4d

  • SSDEEP

    3072:cQSDFbA9MaDCcCQ5IeL20RM3IhWQWv2U7LYFuQwBaBPb:cPJ2m1W0IhWZvAQBap

Score
10/10

Malware Config

Targets

    • Target

      d4c6cab691f3298f9385f533fb162e1a8aed949776254c0fd26ed3a4d27a0640

    • Size

      124KB

    • MD5

      56c42d55c7d3632b8c69cff344650d11

    • SHA1

      1a439553fe95c6b7a3183d8a7d4c6857a8dbdb69

    • SHA256

      d4c6cab691f3298f9385f533fb162e1a8aed949776254c0fd26ed3a4d27a0640

    • SHA512

      04f74fbee0e1f2c55f94f675bca5dbc515a7f3da0b9520d00aa38ab01b6078945bc040dc2855d9a4cee82b2f7b5f9c62934cfef6437c515ab5f9e3d30eb8af4d

    • SSDEEP

      3072:cQSDFbA9MaDCcCQ5IeL20RM3IhWQWv2U7LYFuQwBaBPb:cPJ2m1W0IhWZvAQBap

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks