General

  • Target

    548f712908ed2c8aac2f1f1545aeab0bfbc3353db9ab6035d3d2040b6ecaae9e

  • Size

    211KB

  • Sample

    221125-jq64maff6w

  • MD5

    62650be2c71873cc78d9a8c9500b3c7a

  • SHA1

    8d12976e696b83064a4fb55540c36b52a0cc296a

  • SHA256

    548f712908ed2c8aac2f1f1545aeab0bfbc3353db9ab6035d3d2040b6ecaae9e

  • SHA512

    0de93e1fb89931da1d630a021162d100bd991f0631cae42a561e36123a3ad8fd01b2ff88a8ad9624fba8546bbc1ba658b2451234689c01dcb192c6a9b285b71f

  • SSDEEP

    3072:kblLYNrblBWBcywc06lO9a1t8zvIvCghnqj01XUNRD5byFW:wIdw0ZkUzvIagNqj4UjD5uW

Malware Config

Targets

    • Target

      548f712908ed2c8aac2f1f1545aeab0bfbc3353db9ab6035d3d2040b6ecaae9e

    • Size

      211KB

    • MD5

      62650be2c71873cc78d9a8c9500b3c7a

    • SHA1

      8d12976e696b83064a4fb55540c36b52a0cc296a

    • SHA256

      548f712908ed2c8aac2f1f1545aeab0bfbc3353db9ab6035d3d2040b6ecaae9e

    • SHA512

      0de93e1fb89931da1d630a021162d100bd991f0631cae42a561e36123a3ad8fd01b2ff88a8ad9624fba8546bbc1ba658b2451234689c01dcb192c6a9b285b71f

    • SSDEEP

      3072:kblLYNrblBWBcywc06lO9a1t8zvIvCghnqj01XUNRD5byFW:wIdw0ZkUzvIagNqj4UjD5uW

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks