General

  • Target

    9aefa17c6b1805cfe2402be4fd1daa4433ad21581a10c51174217b15d953c2b4

  • Size

    1.2MB

  • Sample

    221126-gjflzsae8w

  • MD5

    17e94c075637f2969dd1e9853f236b21

  • SHA1

    58dae694e921619c4c9496f98e34cdbb7536d69e

  • SHA256

    9aefa17c6b1805cfe2402be4fd1daa4433ad21581a10c51174217b15d953c2b4

  • SHA512

    2d9828f4bba133ae35cb1ec1cbd29e28ac832fff8b1fb25dcb644512c0d1018f6ec573c56c8ab109c377fa2e5eae3e4c5cc333152af11bbe864a5dd90219c82e

  • SSDEEP

    24576:+BygRiyb8kMBhep34BsM/e1mDQIRhTTAUJjVhY4gHuUT5eAw7DdqVU5N2:+Eyb8kMo34z/B1KUZjgkAWDdqVUW

Malware Config

Targets

    • Target

      光棍节快速免费WEB刷花协议/2014年11月最新QB漏洞.exe

    • Size

      872KB

    • MD5

      5fdf6631f000476337b9135d8693f51a

    • SHA1

      38cbc1b9fc8482fae26f29045d476d4f5d57e06b

    • SHA256

      227232157679a43b206f537953e6f13b1218e2541ed4e8c55d06eb0a3e7cc4e4

    • SHA512

      89b4471979084a2fb97e29766e0c61521009a320138767af43e77bd209598df2ff494e99d3bf4b18b8273db161de5d8beb13c7679a24b5867272e9f6a6870aa2

    • SSDEEP

      12288:3FwqXozy4yaDrofkzGISUQGrBWztqNmnW+YR5nWFpPoSM54G5u0:3F/4ya/o8zNS5JqNKW+7bST9

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      光棍节快速免费WEB刷花协议/WEB无限刷花协议11.11.exe

    • Size

      1.6MB

    • MD5

      f84e4dd9cddd7925078a10cae8009c31

    • SHA1

      97a94ed43ec689934fe7af84f9570194570fc781

    • SHA256

      54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2

    • SHA512

      3e0d7c91b144ef52ad988e53a80a1b4457d9b77e5350341f4706b2707abc5b416aa761d1c35fdd4c13c5b5bdc935670e2ee957fe62c296c3d6dab8876a2c513b

    • SSDEEP

      24576:HNw52RX3IGgsPJnOK5BF6t1poyRBKx3htCYpJ4+I0z1N2V2:HDBhrFulixtC24+RU2

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks