General

  • Target

    2765f7ea0956bac0d64bd9799705f601e6fd42770294354ea4b74a6998137b61

  • Size

    206KB

  • Sample

    221127-xq8t4sbe56

  • MD5

    44992c27cd09dc998b239e3dae7095f6

  • SHA1

    f8111075dc7fac6c4b7997438943fe6078a72147

  • SHA256

    2765f7ea0956bac0d64bd9799705f601e6fd42770294354ea4b74a6998137b61

  • SHA512

    92c3f96a2c9e361012deee0d698941009484c52d081218352b92dad1d981f6ea77c9fcff104f394d1bc167ca3b6ef6be460771fe2c153e5a82dc409edbc12d78

  • SSDEEP

    3072:lmR3i6zP2xc9SfRH/Qin/jzO5tP0/0S9Db31kvSGv6gG2nAwDtV:lmQ6yxc9SF4l52jnlN06jIbT

Malware Config

Targets

    • Target

      2765f7ea0956bac0d64bd9799705f601e6fd42770294354ea4b74a6998137b61

    • Size

      206KB

    • MD5

      44992c27cd09dc998b239e3dae7095f6

    • SHA1

      f8111075dc7fac6c4b7997438943fe6078a72147

    • SHA256

      2765f7ea0956bac0d64bd9799705f601e6fd42770294354ea4b74a6998137b61

    • SHA512

      92c3f96a2c9e361012deee0d698941009484c52d081218352b92dad1d981f6ea77c9fcff104f394d1bc167ca3b6ef6be460771fe2c153e5a82dc409edbc12d78

    • SSDEEP

      3072:lmR3i6zP2xc9SfRH/Qin/jzO5tP0/0S9Db31kvSGv6gG2nAwDtV:lmQ6yxc9SF4l52jnlN06jIbT

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Deletes itself

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks