General

  • Target

    b62fac0d96da7a95beed52c8fea432ab3308fd714209cf50f1123867a4e03725

  • Size

    422KB

  • Sample

    221124-cp2zysec9y

  • MD5

    554c3f24b05707d2b19bf38507598d76

  • SHA1

    d97f51df068df55952aa8c04262bebcad9854d11

  • SHA256

    b62fac0d96da7a95beed52c8fea432ab3308fd714209cf50f1123867a4e03725

  • SHA512

    7c7c952285de0f8c57c6a87abec26936dadc7abf5263b783c4ac6135d7a18f4dfa42fc05aaf5ad0b791f2e741016496e22201e751e532eb55a0f113fd92e9328

  • SSDEEP

    6144:T+jJxTnGqaR6rlsG6LbrVSlKR85hIp81G5NQu604EPyl3VQdF02nPVllvjAfTIj:EJMNorlsG6ZR8Z6NZylwFpPVl2Ij

Score
8/10

Malware Config

Targets

    • Target

      b62fac0d96da7a95beed52c8fea432ab3308fd714209cf50f1123867a4e03725

    • Size

      422KB

    • MD5

      554c3f24b05707d2b19bf38507598d76

    • SHA1

      d97f51df068df55952aa8c04262bebcad9854d11

    • SHA256

      b62fac0d96da7a95beed52c8fea432ab3308fd714209cf50f1123867a4e03725

    • SHA512

      7c7c952285de0f8c57c6a87abec26936dadc7abf5263b783c4ac6135d7a18f4dfa42fc05aaf5ad0b791f2e741016496e22201e751e532eb55a0f113fd92e9328

    • SSDEEP

      6144:T+jJxTnGqaR6rlsG6LbrVSlKR85hIp81G5NQu604EPyl3VQdF02nPVllvjAfTIj:EJMNorlsG6ZR8Z6NZylwFpPVl2Ij

    Score
    8/10
    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks