General

  • Target

    2593e25ff0b8df13067071ca27532c46e9de52cadb3b0159a8879f68d2d12762

  • Size

    165KB

  • Sample

    221126-pyzmeadd44

  • MD5

    20d875ef318f7fe70895b7ca2d8c73fa

  • SHA1

    8368173f6edc826b06f72b2fef0818931f49ba5d

  • SHA256

    2593e25ff0b8df13067071ca27532c46e9de52cadb3b0159a8879f68d2d12762

  • SHA512

    bd8632736cb816bd94fefad125138996dc0ae02f066dff3f498762c55be96c652fbcf6763b46f99c212c578275795fb4b675b4aaf138f0e237c5934ac71e375c

  • SSDEEP

    3072:KYmlOJseb6jEfMR5kF/71yiMF44WyUtVU1yOXGB8kFF/df2oFfHgWiI+xR:vueOwqfJxU7iFXG/rdf2oRPy

Malware Config

Targets

    • Target

      2593e25ff0b8df13067071ca27532c46e9de52cadb3b0159a8879f68d2d12762

    • Size

      165KB

    • MD5

      20d875ef318f7fe70895b7ca2d8c73fa

    • SHA1

      8368173f6edc826b06f72b2fef0818931f49ba5d

    • SHA256

      2593e25ff0b8df13067071ca27532c46e9de52cadb3b0159a8879f68d2d12762

    • SHA512

      bd8632736cb816bd94fefad125138996dc0ae02f066dff3f498762c55be96c652fbcf6763b46f99c212c578275795fb4b675b4aaf138f0e237c5934ac71e375c

    • SSDEEP

      3072:KYmlOJseb6jEfMR5kF/71yiMF44WyUtVU1yOXGB8kFF/df2oFfHgWiI+xR:vueOwqfJxU7iFXG/rdf2oRPy

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks