General

  • Target

    7022eb418e357d29b944bc67e2b9af3e97f5d111c6bcc247395bb7cb0a08cc4c

  • Size

    375KB

  • Sample

    221129-jv2ppsaf82

  • MD5

    3cf291168e94b2b9245ec1f5962073f0

  • SHA1

    d69a8a1e31d327500a9d1bb9509c96ffed4afd2e

  • SHA256

    7022eb418e357d29b944bc67e2b9af3e97f5d111c6bcc247395bb7cb0a08cc4c

  • SHA512

    fc4ca6647b24f86e8660c5b56e837c8c34f5c6a546b6362bd05fe33c1e8b4bac9d278851b0ef58c62c167cc0070e69da033436bcef9e55232dab3b5ec9229c99

  • SSDEEP

    6144:rrLm6QyYI1Sfyoeuy9wJvK4otkzQqetVwq/zimado/16io6y8IQFNdx+u1lXtn8u:3Lm6QyBEyGy9mvJotAlG/zqqkf5QFV+i

Malware Config

Targets

    • Target

      7022eb418e357d29b944bc67e2b9af3e97f5d111c6bcc247395bb7cb0a08cc4c

    • Size

      375KB

    • MD5

      3cf291168e94b2b9245ec1f5962073f0

    • SHA1

      d69a8a1e31d327500a9d1bb9509c96ffed4afd2e

    • SHA256

      7022eb418e357d29b944bc67e2b9af3e97f5d111c6bcc247395bb7cb0a08cc4c

    • SHA512

      fc4ca6647b24f86e8660c5b56e837c8c34f5c6a546b6362bd05fe33c1e8b4bac9d278851b0ef58c62c167cc0070e69da033436bcef9e55232dab3b5ec9229c99

    • SSDEEP

      6144:rrLm6QyYI1Sfyoeuy9wJvK4otkzQqetVwq/zimado/16io6y8IQFNdx+u1lXtn8u:3Lm6QyBEyGy9mvJotAlG/zqqkf5QFV+i

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks