General

  • Target

    73313ab66ea308d4e1d1d8482632609b7af848fb3912cd7b6eb13bd203d691c9

  • Size

    182KB

  • Sample

    221126-pd7saafd3w

  • MD5

    74c53632c9a4ed7ceeb262c26323fe66

  • SHA1

    503acdb7bb04f1c03d58525b099055544638f434

  • SHA256

    73313ab66ea308d4e1d1d8482632609b7af848fb3912cd7b6eb13bd203d691c9

  • SHA512

    eedfa1132baff659760c3a71d224b2e81ba99eee5c1981b78784aa2ba44ea023cdabce3e7b3430ae8922ccfe122ee04d32f3990d48fbe07ff72321e55b72d7b6

  • SSDEEP

    3072:stjbRotGtB4ICKDyhj5UhbSWKPM1aR9D/MCtLrdhfEIlES:stXvCngSh0y0CBrdtGS

Malware Config

Targets

    • Target

      73313ab66ea308d4e1d1d8482632609b7af848fb3912cd7b6eb13bd203d691c9

    • Size

      182KB

    • MD5

      74c53632c9a4ed7ceeb262c26323fe66

    • SHA1

      503acdb7bb04f1c03d58525b099055544638f434

    • SHA256

      73313ab66ea308d4e1d1d8482632609b7af848fb3912cd7b6eb13bd203d691c9

    • SHA512

      eedfa1132baff659760c3a71d224b2e81ba99eee5c1981b78784aa2ba44ea023cdabce3e7b3430ae8922ccfe122ee04d32f3990d48fbe07ff72321e55b72d7b6

    • SSDEEP

      3072:stjbRotGtB4ICKDyhj5UhbSWKPM1aR9D/MCtLrdhfEIlES:stXvCngSh0y0CBrdtGS

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks