General

  • Target

    5097e0ad09c727c6efdfa68981247eb7877aa58d8119fe9ed21f003e19ca5453

  • Size

    235KB

  • Sample

    221127-th96esea5v

  • MD5

    5e639bac6570d611dcb7bd84f721df9a

  • SHA1

    37a77bc065294ab26356c4b2785821d496130597

  • SHA256

    5097e0ad09c727c6efdfa68981247eb7877aa58d8119fe9ed21f003e19ca5453

  • SHA512

    41776162eaa7e524aab4b04b9e3f0013810771372202360048b54283ab26d7544945dacbe1e2c1aa17b1e152e980f547266a1f127d9b729627b598d43d2a97b8

  • SSDEEP

    3072:/+gtxCUCkKgtcRzNYpZgR/MpF6If2hcJ7XczlUfnZ4tQAi+VGyg0AHFPZ92qQury:/NCDkKYo//If97szlcVU+ddDYue

Malware Config

Targets

    • Target

      5097e0ad09c727c6efdfa68981247eb7877aa58d8119fe9ed21f003e19ca5453

    • Size

      235KB

    • MD5

      5e639bac6570d611dcb7bd84f721df9a

    • SHA1

      37a77bc065294ab26356c4b2785821d496130597

    • SHA256

      5097e0ad09c727c6efdfa68981247eb7877aa58d8119fe9ed21f003e19ca5453

    • SHA512

      41776162eaa7e524aab4b04b9e3f0013810771372202360048b54283ab26d7544945dacbe1e2c1aa17b1e152e980f547266a1f127d9b729627b598d43d2a97b8

    • SSDEEP

      3072:/+gtxCUCkKgtcRzNYpZgR/MpF6If2hcJ7XczlUfnZ4tQAi+VGyg0AHFPZ92qQury:/NCDkKYo//If97szlcVU+ddDYue

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks