General

  • Target

    433cd8e33551bab506c297c3336b13414aa88426dd7c2ced740641c8181b7761

  • Size

    165KB

  • Sample

    221124-ad7pyseb67

  • MD5

    084b4fb4443b823e0970a64008c9b260

  • SHA1

    eec2f905bc70c28923c49d9bd9d23f3a5903eb0c

  • SHA256

    433cd8e33551bab506c297c3336b13414aa88426dd7c2ced740641c8181b7761

  • SHA512

    43ef42fc5b10870039769cac531d8c76911a7b50a1dc6b168a512c506fa6deb2b45a523a20d3b3f1b6d8eb98d66108bc0b183562dbf598007c7711d5bd8ed89d

  • SSDEEP

    3072:g2Z92eoy7KgiONIiML5DsVg/5bPAxGVI2HklxoNEXqhbM8EGqkAVPH4zHbX:p2eohig9oVg/xAEVI2Heo/dh1AVPubX

Score
10/10

Malware Config

Targets

    • Target

      433cd8e33551bab506c297c3336b13414aa88426dd7c2ced740641c8181b7761

    • Size

      165KB

    • MD5

      084b4fb4443b823e0970a64008c9b260

    • SHA1

      eec2f905bc70c28923c49d9bd9d23f3a5903eb0c

    • SHA256

      433cd8e33551bab506c297c3336b13414aa88426dd7c2ced740641c8181b7761

    • SHA512

      43ef42fc5b10870039769cac531d8c76911a7b50a1dc6b168a512c506fa6deb2b45a523a20d3b3f1b6d8eb98d66108bc0b183562dbf598007c7711d5bd8ed89d

    • SSDEEP

      3072:g2Z92eoy7KgiONIiML5DsVg/5bPAxGVI2HklxoNEXqhbM8EGqkAVPH4zHbX:p2eohig9oVg/xAEVI2Heo/dh1AVPubX

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks