General

  • Target

    e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6

  • Size

    88KB

  • Sample

    221123-vwjq3ada9t

  • MD5

    445f590129ab3578a25406e13bf59676

  • SHA1

    b31b91185600c836b00fa11e5a9917d330b28fb8

  • SHA256

    e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6

  • SHA512

    0678760652a5fdd6797138997ae5bace62dc2776679685de163d906fd908d7ccf29f339ad6d0653f2fb2f70734637da19e5dbeebe2529aa374b44679a23e9dac

  • SSDEEP

    1536:tKKs7bYXLLXH0qKPY/jLVTB7GhbO5dnT0LmXub31WLSDYYtw/s:3eE3XHdKQXFNx5omXub3QLKtw

Score
10/10

Malware Config

Targets

    • Target

      e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6

    • Size

      88KB

    • MD5

      445f590129ab3578a25406e13bf59676

    • SHA1

      b31b91185600c836b00fa11e5a9917d330b28fb8

    • SHA256

      e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6

    • SHA512

      0678760652a5fdd6797138997ae5bace62dc2776679685de163d906fd908d7ccf29f339ad6d0653f2fb2f70734637da19e5dbeebe2529aa374b44679a23e9dac

    • SSDEEP

      1536:tKKs7bYXLLXH0qKPY/jLVTB7GhbO5dnT0LmXub31WLSDYYtw/s:3eE3XHdKQXFNx5omXub3QLKtw

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks