General

  • Target

    f9e214a9e6f22672314960d62940c04934f32d1cb919e78dfa82f648caff6d78

  • Size

    460KB

  • Sample

    221126-16j3gahd52

  • MD5

    f72adf5d1d285395873a59b7d21af149

  • SHA1

    de18a4c656f2c836495a5ef8a2471791ba695afa

  • SHA256

    f9e214a9e6f22672314960d62940c04934f32d1cb919e78dfa82f648caff6d78

  • SHA512

    e84197b491ab41fb9914be95e91a41c1d9022b69c91e976bd09568666c997abf4b739ca1e0ae06b56b5fcc7ad146989f22b9ee56a8eb0330311fa69a0f062884

  • SSDEEP

    12288:RZQu5fVRtnjsiG3u4MQn7Rav3s5SXI1VlQzIp3Rwt:j5fZQFua7Rav3hEPQzkB

Malware Config

Targets

    • Target

      f9e214a9e6f22672314960d62940c04934f32d1cb919e78dfa82f648caff6d78

    • Size

      460KB

    • MD5

      f72adf5d1d285395873a59b7d21af149

    • SHA1

      de18a4c656f2c836495a5ef8a2471791ba695afa

    • SHA256

      f9e214a9e6f22672314960d62940c04934f32d1cb919e78dfa82f648caff6d78

    • SHA512

      e84197b491ab41fb9914be95e91a41c1d9022b69c91e976bd09568666c997abf4b739ca1e0ae06b56b5fcc7ad146989f22b9ee56a8eb0330311fa69a0f062884

    • SSDEEP

      12288:RZQu5fVRtnjsiG3u4MQn7Rav3s5SXI1VlQzIp3Rwt:j5fZQFua7Rav3hEPQzkB

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks