General

  • Target

    9e0a05e3a229689fba6aef9de7663538ca9f5839aeed562cd8b6b5bf69187737

  • Size

    289KB

  • Sample

    221126-n3zmjaca23

  • MD5

    61df1ac8ce37abf137009c9523392f5d

  • SHA1

    a17dc22ff32b50ec08d0f4141ffe43eee5a55201

  • SHA256

    9e0a05e3a229689fba6aef9de7663538ca9f5839aeed562cd8b6b5bf69187737

  • SHA512

    2a92b1ab9215a235e964a222bc987d260bece6ef283a99a348f41c56fe3ff8d90c1f704a14fe16af6e148d2760b32f007bac7920719d9eb0c7a42a64c84a694a

  • SSDEEP

    3072:zU9Rb1hsfopC8kBBoy15spJDXiyup4ZiHtCZUIeImkxvSNB40uu3:zmJsfoY8UBlCwpqi4WkxoB7u

Malware Config

Targets

    • Target

      9e0a05e3a229689fba6aef9de7663538ca9f5839aeed562cd8b6b5bf69187737

    • Size

      289KB

    • MD5

      61df1ac8ce37abf137009c9523392f5d

    • SHA1

      a17dc22ff32b50ec08d0f4141ffe43eee5a55201

    • SHA256

      9e0a05e3a229689fba6aef9de7663538ca9f5839aeed562cd8b6b5bf69187737

    • SHA512

      2a92b1ab9215a235e964a222bc987d260bece6ef283a99a348f41c56fe3ff8d90c1f704a14fe16af6e148d2760b32f007bac7920719d9eb0c7a42a64c84a694a

    • SSDEEP

      3072:zU9Rb1hsfopC8kBBoy15spJDXiyup4ZiHtCZUIeImkxvSNB40uu3:zmJsfoY8UBlCwpqi4WkxoB7u

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks