General

  • Target

    8c25db0f2f9c965837124b3eeaa7b65781e8b40b34044e87116ce2cbf2cb5ac1

  • Size

    508KB

  • Sample

    221128-f5fnfahd98

  • MD5

    b7b95bd8a46ba81555063e3c1c0f3372

  • SHA1

    713522f07ac3b00c8692b4c6fc930091092277e8

  • SHA256

    8c25db0f2f9c965837124b3eeaa7b65781e8b40b34044e87116ce2cbf2cb5ac1

  • SHA512

    9b2d3bfe4e0d633c525547f7e7c988460698cd53a5f66e5e9bc9f346a0a2563572169c986699cbccf8d4e0b73dd7a7cb482df070e7e9cdfd47b1a84066d6daed

  • SSDEEP

    6144:H3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:H3xxPuFVtSdWJsuWXLGMvxsltRok/Gy

Score
10/10

Malware Config

Targets

    • Target

      8c25db0f2f9c965837124b3eeaa7b65781e8b40b34044e87116ce2cbf2cb5ac1

    • Size

      508KB

    • MD5

      b7b95bd8a46ba81555063e3c1c0f3372

    • SHA1

      713522f07ac3b00c8692b4c6fc930091092277e8

    • SHA256

      8c25db0f2f9c965837124b3eeaa7b65781e8b40b34044e87116ce2cbf2cb5ac1

    • SHA512

      9b2d3bfe4e0d633c525547f7e7c988460698cd53a5f66e5e9bc9f346a0a2563572169c986699cbccf8d4e0b73dd7a7cb482df070e7e9cdfd47b1a84066d6daed

    • SSDEEP

      6144:H3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:H3xxPuFVtSdWJsuWXLGMvxsltRok/Gy

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks