General

  • Target

    b73518f4d0d5e0f3ac262335ae4715f4f54f91f623a6de74c2ef1326754b6c39

  • Size

    191KB

  • Sample

    221127-sj3masfg73

  • MD5

    e6c81c0a935b723201e297f3cec55ae4

  • SHA1

    dd21b3b803105d922d64cbeccbe9474d7d841cca

  • SHA256

    b73518f4d0d5e0f3ac262335ae4715f4f54f91f623a6de74c2ef1326754b6c39

  • SHA512

    c5cf01e63ae35bddd6b276f389c3de005f536e383feb38948e7bae72cac9fef37f52dd4eb5b05a87c9f98e399ad457eb78c898e4008da666d1b881e4826c92fc

  • SSDEEP

    3072:epP3WXUQRkgydpjyGNf01DERN8fCob/gL1jJ+TcW8FB64pl4kiNWxnybz:gP3eYdriYaCaJcWaB66i8xnybz

Malware Config

Targets

    • Target

      b73518f4d0d5e0f3ac262335ae4715f4f54f91f623a6de74c2ef1326754b6c39

    • Size

      191KB

    • MD5

      e6c81c0a935b723201e297f3cec55ae4

    • SHA1

      dd21b3b803105d922d64cbeccbe9474d7d841cca

    • SHA256

      b73518f4d0d5e0f3ac262335ae4715f4f54f91f623a6de74c2ef1326754b6c39

    • SHA512

      c5cf01e63ae35bddd6b276f389c3de005f536e383feb38948e7bae72cac9fef37f52dd4eb5b05a87c9f98e399ad457eb78c898e4008da666d1b881e4826c92fc

    • SSDEEP

      3072:epP3WXUQRkgydpjyGNf01DERN8fCob/gL1jJ+TcW8FB64pl4kiNWxnybz:gP3eYdriYaCaJcWaB66i8xnybz

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

        Execution

          Exfiltration

            Impact

              Initial Access

                Lateral Movement

                  Privilege Escalation

                    Tasks