General

  • Target

    f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3

  • Size

    192KB

  • Sample

    221125-2jzebaca42

  • MD5

    f8b629eee798245f18f2b7415642993a

  • SHA1

    3853e76f713d1274f6e897b4957a74bd9fcfd98e

  • SHA256

    f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3

  • SHA512

    eba6df3594fa71d806d0910fc740371fb0223cd200344315e2cc0a109db01abfc223a3053a57c9651ff0eadb3fbac66f39de6a5a9e1d231a0f2fd342816549fe

  • SSDEEP

    3072:kAoU1Bieu+xxf0pTraRV5uH/QJillUd2KltjGSVVfKmw9y:1in+oTCG/z62+9+y

Score
8/10

Malware Config

Targets

    • Target

      f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3

    • Size

      192KB

    • MD5

      f8b629eee798245f18f2b7415642993a

    • SHA1

      3853e76f713d1274f6e897b4957a74bd9fcfd98e

    • SHA256

      f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3

    • SHA512

      eba6df3594fa71d806d0910fc740371fb0223cd200344315e2cc0a109db01abfc223a3053a57c9651ff0eadb3fbac66f39de6a5a9e1d231a0f2fd342816549fe

    • SSDEEP

      3072:kAoU1Bieu+xxf0pTraRV5uH/QJillUd2KltjGSVVfKmw9y:1in+oTCG/z62+9+y

    Score
    8/10
    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks