General

  • Target

    98ac0b6a25eeb8cdbe08a7dbd4e63c990f1102ed3cecfce9e3f6e20b2abfac30

  • Size

    96KB

  • Sample

    221127-mlafmsec3t

  • MD5

    6ff997ccdafd56eda688b8ed52b8554b

  • SHA1

    af26c04673682dff6ed2c8f16c0b3d59678f2a39

  • SHA256

    98ac0b6a25eeb8cdbe08a7dbd4e63c990f1102ed3cecfce9e3f6e20b2abfac30

  • SHA512

    1693cfc30f1af8eb4c50885c5df708cdb4a93bbea863f4af92bc8f755894044c7d48958148591bc066d97d5d8aa97a25015826f98a26b610d1b05abdb6b2b5b0

  • SSDEEP

    3072:hM+9i7SFCIXJZG99WBBOeEHSXfWR5au74wU/:hMTCP4cXOeEHSIb4V

Malware Config

Targets

    • Target

      98ac0b6a25eeb8cdbe08a7dbd4e63c990f1102ed3cecfce9e3f6e20b2abfac30

    • Size

      96KB

    • MD5

      6ff997ccdafd56eda688b8ed52b8554b

    • SHA1

      af26c04673682dff6ed2c8f16c0b3d59678f2a39

    • SHA256

      98ac0b6a25eeb8cdbe08a7dbd4e63c990f1102ed3cecfce9e3f6e20b2abfac30

    • SHA512

      1693cfc30f1af8eb4c50885c5df708cdb4a93bbea863f4af92bc8f755894044c7d48958148591bc066d97d5d8aa97a25015826f98a26b610d1b05abdb6b2b5b0

    • SSDEEP

      3072:hM+9i7SFCIXJZG99WBBOeEHSXfWR5au74wU/:hMTCP4cXOeEHSIb4V

    • Loads dropped DLL

    • Adds Run key to start application

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks