General

  • Target

    8559e7931248d23d4003b8f489245ac4652ecca9ffdc9ad60baf4aad33946a95

  • Size

    674KB

  • Sample

    221126-3fcltacg84

  • MD5

    61b1b37bace136923abae370751a984c

  • SHA1

    e9a4950aebb6dde4b081959c0e6faa81671a9933

  • SHA256

    8559e7931248d23d4003b8f489245ac4652ecca9ffdc9ad60baf4aad33946a95

  • SHA512

    25c84e208da2e83f8c648707860434e95d42f4fcb8d0d620f6fa19b1a4ba6760d9cd1442c258509b8d23c5dd93d35da2cccffd743283fe95a526c8d24bb4b3e8

  • SSDEEP

    12288:lK2mhAMJ/cPlTDhz79tUY5GiQodGsbIS+0sTRywOZtjiOuKAsUs8:k2O/GlTDtA/iQ4GZeFjiOOsk

Malware Config

Targets

    • Target

      8559e7931248d23d4003b8f489245ac4652ecca9ffdc9ad60baf4aad33946a95

    • Size

      674KB

    • MD5

      61b1b37bace136923abae370751a984c

    • SHA1

      e9a4950aebb6dde4b081959c0e6faa81671a9933

    • SHA256

      8559e7931248d23d4003b8f489245ac4652ecca9ffdc9ad60baf4aad33946a95

    • SHA512

      25c84e208da2e83f8c648707860434e95d42f4fcb8d0d620f6fa19b1a4ba6760d9cd1442c258509b8d23c5dd93d35da2cccffd743283fe95a526c8d24bb4b3e8

    • SSDEEP

      12288:lK2mhAMJ/cPlTDhz79tUY5GiQodGsbIS+0sTRywOZtjiOuKAsUs8:k2O/GlTDtA/iQ4GZeFjiOOsk

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks