General

  • Target

    7ca9dbbfaf003c4365f9ba29f19ecda34d1745147a72b53f291c320e8b8f0c70

  • Size

    174KB

  • Sample

    221127-tec2hsdf8w

  • MD5

    75ce946a23463775e9e9775827bc1b5f

  • SHA1

    2abdafb036a8e51e1bd9ebf35d8a84dcea0d5316

  • SHA256

    7ca9dbbfaf003c4365f9ba29f19ecda34d1745147a72b53f291c320e8b8f0c70

  • SHA512

    b09729afb65da6ff1ce6fa052b9075d155dbd4b8c6119890a60d49b4d72eb695b307f3a22b3170e52d214d6c417d252915daacfa8e03f087bde8d0dbb98352af

  • SSDEEP

    3072:cgXdZt9P6D3XJFdy49ml1sIOZF0KWzsCi3ZhkP+YT6erSvy4rUhwRnT:ce34PdFmlSIkFpWzA3MWYT+vy4hT

Malware Config

Targets

    • Target

      7ca9dbbfaf003c4365f9ba29f19ecda34d1745147a72b53f291c320e8b8f0c70

    • Size

      174KB

    • MD5

      75ce946a23463775e9e9775827bc1b5f

    • SHA1

      2abdafb036a8e51e1bd9ebf35d8a84dcea0d5316

    • SHA256

      7ca9dbbfaf003c4365f9ba29f19ecda34d1745147a72b53f291c320e8b8f0c70

    • SHA512

      b09729afb65da6ff1ce6fa052b9075d155dbd4b8c6119890a60d49b4d72eb695b307f3a22b3170e52d214d6c417d252915daacfa8e03f087bde8d0dbb98352af

    • SSDEEP

      3072:cgXdZt9P6D3XJFdy49ml1sIOZF0KWzsCi3ZhkP+YT6erSvy4rUhwRnT:ce34PdFmlSIkFpWzA3MWYT+vy4hT

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks