General

  • Target

    deb48b988b6c5426e78cdd99b392630101d81aac038bca9b7ce52b2d555566da

  • Size

    508KB

  • Sample

    221123-z53yhsee72

  • MD5

    524621ae1f7ca04301f6242c0929840d

  • SHA1

    378abe28b8c5660ffebb18f784646112ef992e50

  • SHA256

    deb48b988b6c5426e78cdd99b392630101d81aac038bca9b7ce52b2d555566da

  • SHA512

    757230ca13dc90c1b76b4be470e45ae31253dd6b4b84c12e8dc90b41c2818068b190da0b94599a1c6f523bc5491bcd2af40770dc15343e2aa0f0428343457185

  • SSDEEP

    6144:R3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:R3xxPuFVtSdWJsuWXLGMvxsltRok/Gy

Score
10/10

Malware Config

Targets

    • Target

      deb48b988b6c5426e78cdd99b392630101d81aac038bca9b7ce52b2d555566da

    • Size

      508KB

    • MD5

      524621ae1f7ca04301f6242c0929840d

    • SHA1

      378abe28b8c5660ffebb18f784646112ef992e50

    • SHA256

      deb48b988b6c5426e78cdd99b392630101d81aac038bca9b7ce52b2d555566da

    • SHA512

      757230ca13dc90c1b76b4be470e45ae31253dd6b4b84c12e8dc90b41c2818068b190da0b94599a1c6f523bc5491bcd2af40770dc15343e2aa0f0428343457185

    • SSDEEP

      6144:R3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:R3xxPuFVtSdWJsuWXLGMvxsltRok/Gy

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Process Discovery

1
T1057

Tasks