General

  • Target

    adcfdc5380cec3fb9265a0ec010b92fe0348be16d9c27399f8f96b42f15bec53

  • Size

    310KB

  • Sample

    221124-zmhjvscd3v

  • MD5

    65c009ec4bc81ac1d4d3883974003b0a

  • SHA1

    6ea8e112aee7e53d98dada520a25ef804a8f7399

  • SHA256

    adcfdc5380cec3fb9265a0ec010b92fe0348be16d9c27399f8f96b42f15bec53

  • SHA512

    977062301afcdb9e3a588db7f7fd95bfb3b18c68bccd379f7f579cf4b3b823178beffc25faa248e9d3d9f7ef898116c96c08c927b649faa7110549d7d4ef064d

  • SSDEEP

    6144:5yZcAuFcCf38XolyxnDFJ6VcRBha8wB9iLsU64XxrzEWekrBNYsLjZiT:gTOcCf6y05u/y+OrBNYsZiT

Score
8/10

Malware Config

Targets

    • Target

      adcfdc5380cec3fb9265a0ec010b92fe0348be16d9c27399f8f96b42f15bec53

    • Size

      310KB

    • MD5

      65c009ec4bc81ac1d4d3883974003b0a

    • SHA1

      6ea8e112aee7e53d98dada520a25ef804a8f7399

    • SHA256

      adcfdc5380cec3fb9265a0ec010b92fe0348be16d9c27399f8f96b42f15bec53

    • SHA512

      977062301afcdb9e3a588db7f7fd95bfb3b18c68bccd379f7f579cf4b3b823178beffc25faa248e9d3d9f7ef898116c96c08c927b649faa7110549d7d4ef064d

    • SSDEEP

      6144:5yZcAuFcCf38XolyxnDFJ6VcRBha8wB9iLsU64XxrzEWekrBNYsLjZiT:gTOcCf6y05u/y+OrBNYsZiT

    Score
    8/10
    • Adds policy Run key to start application

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks