General

  • Target

    ee15d63fb091e6eb0022bacfe9dde198381252ca0aa1bcdabc50aff7ee19f1ec

  • Size

    1.4MB

  • Sample

    221129-n4lgasfg37

  • MD5

    c630c1a06513fa4304adef4d719c3e66

  • SHA1

    70d5cccb9378fe093fad20255fdc3d40b6b42e53

  • SHA256

    ee15d63fb091e6eb0022bacfe9dde198381252ca0aa1bcdabc50aff7ee19f1ec

  • SHA512

    2dde77ab8b833d3c65164b2c71d59fd4a99dba6c34bda7335eecbedfb77454c59c25008fde1c88594110aea5a39dd62610f8f83b3e64d4a24b3d80069247f366

  • SSDEEP

    12288:K7bx5YC+ls35Tuc2rmbx0S084eMJBV7Mb11khF8+5lg:K79EWhMmEF8

Score
10/10

Malware Config

Targets

    • Target

      ee15d63fb091e6eb0022bacfe9dde198381252ca0aa1bcdabc50aff7ee19f1ec

    • Size

      1.4MB

    • MD5

      c630c1a06513fa4304adef4d719c3e66

    • SHA1

      70d5cccb9378fe093fad20255fdc3d40b6b42e53

    • SHA256

      ee15d63fb091e6eb0022bacfe9dde198381252ca0aa1bcdabc50aff7ee19f1ec

    • SHA512

      2dde77ab8b833d3c65164b2c71d59fd4a99dba6c34bda7335eecbedfb77454c59c25008fde1c88594110aea5a39dd62610f8f83b3e64d4a24b3d80069247f366

    • SSDEEP

      12288:K7bx5YC+ls35Tuc2rmbx0S084eMJBV7Mb11khF8+5lg:K79EWhMmEF8

    Score
    10/10
    • Modifies firewall policy service

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks