General

  • Target

    d2850b3b2acf9f89268f11ac2d6953d196fbf2d483d0d8a8a02c3d5f5c2b8c26

  • Size

    1.1MB

  • Sample

    221125-3b7w6aec29

  • MD5

    45e13aec090b838819742b637227da50

  • SHA1

    a9370d9219fa475c6e0ef6b4d81c124f38b73667

  • SHA256

    d2850b3b2acf9f89268f11ac2d6953d196fbf2d483d0d8a8a02c3d5f5c2b8c26

  • SHA512

    9fda0b1c6b3e97134b3c00419c10f1b0c64700190b289fce2375dc5c4232f180961c59fcddbc8d10d1f1eb165021928bdb5f0175ee72f2752e179c63387f712b

  • SSDEEP

    24576:caUxvxK4jt39HnmeochnTSJ+65J9hKx6D1tkLhKvanfmi:wJKMHnoQ435XhjD1SlV

Malware Config

Targets

    • Target

      d2850b3b2acf9f89268f11ac2d6953d196fbf2d483d0d8a8a02c3d5f5c2b8c26

    • Size

      1.1MB

    • MD5

      45e13aec090b838819742b637227da50

    • SHA1

      a9370d9219fa475c6e0ef6b4d81c124f38b73667

    • SHA256

      d2850b3b2acf9f89268f11ac2d6953d196fbf2d483d0d8a8a02c3d5f5c2b8c26

    • SHA512

      9fda0b1c6b3e97134b3c00419c10f1b0c64700190b289fce2375dc5c4232f180961c59fcddbc8d10d1f1eb165021928bdb5f0175ee72f2752e179c63387f712b

    • SSDEEP

      24576:caUxvxK4jt39HnmeochnTSJ+65J9hKx6D1tkLhKvanfmi:wJKMHnoQ435XhjD1SlV

    • UAC bypass

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks