General

  • Target

    ac12f210b9096b9bc01e15626bffb398c8e447849a83d0f9015a5c7955d369c3

  • Size

    165KB

  • Sample

    221125-h38mjsdh6w

  • MD5

    5b222fd179a8276d6cf95e3f9f38c90c

  • SHA1

    37cf1928825a4efc261bc6a675909d0865a57914

  • SHA256

    ac12f210b9096b9bc01e15626bffb398c8e447849a83d0f9015a5c7955d369c3

  • SHA512

    53046a0312a5f6d3e907b6d78e0e59c0ca94556d486ec0abd50991af69f60ff3c46ed66490ab89a98893d6147bda5e1932325b18426967d2d781a319fd774bb6

  • SSDEEP

    3072:n0Bqu365whUPrH7ysg1WkPPSQ2FZ81/jkF5zVYJdAo1++:n0BuXdkyQuGLkHSJN

Malware Config

Targets

    • Target

      ac12f210b9096b9bc01e15626bffb398c8e447849a83d0f9015a5c7955d369c3

    • Size

      165KB

    • MD5

      5b222fd179a8276d6cf95e3f9f38c90c

    • SHA1

      37cf1928825a4efc261bc6a675909d0865a57914

    • SHA256

      ac12f210b9096b9bc01e15626bffb398c8e447849a83d0f9015a5c7955d369c3

    • SHA512

      53046a0312a5f6d3e907b6d78e0e59c0ca94556d486ec0abd50991af69f60ff3c46ed66490ab89a98893d6147bda5e1932325b18426967d2d781a319fd774bb6

    • SSDEEP

      3072:n0Bqu365whUPrH7ysg1WkPPSQ2FZ81/jkF5zVYJdAo1++:n0BuXdkyQuGLkHSJN

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks