General

  • Target

    703e86c3a4536a725689e714cee8c344c5a461a9faf230c6e144c243661ff1ef

  • Size

    927KB

  • Sample

    221126-af2xgsbg8v

  • MD5

    271641cd6ba6392dd896380a21483c9d

  • SHA1

    61b40ffdb0c9cf50361ec1c03731af0d57470d2b

  • SHA256

    703e86c3a4536a725689e714cee8c344c5a461a9faf230c6e144c243661ff1ef

  • SHA512

    f271305c0d9c50da9802f18874abf1b5823814d8c8a61faec3bdfc32b130702735337fe5525d830c6cb1caec2487f6e3164f04b76fd943ec9606629bb1d39519

  • SSDEEP

    12288:WhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aXWHuCBsxJgm+0kLf8hl1W:GRmJkcoQricOIQxiZY1iaXWjBs7221Rg

Score
8/10

Malware Config

Targets

    • Target

      703e86c3a4536a725689e714cee8c344c5a461a9faf230c6e144c243661ff1ef

    • Size

      927KB

    • MD5

      271641cd6ba6392dd896380a21483c9d

    • SHA1

      61b40ffdb0c9cf50361ec1c03731af0d57470d2b

    • SHA256

      703e86c3a4536a725689e714cee8c344c5a461a9faf230c6e144c243661ff1ef

    • SHA512

      f271305c0d9c50da9802f18874abf1b5823814d8c8a61faec3bdfc32b130702735337fe5525d830c6cb1caec2487f6e3164f04b76fd943ec9606629bb1d39519

    • SSDEEP

      12288:WhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aXWHuCBsxJgm+0kLf8hl1W:GRmJkcoQricOIQxiZY1iaXWjBs7221Rg

    Score
    8/10
    • Drops file in Drivers directory

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks