General

  • Target

    8b5fb45cf4006aeb513a7a982b402fa695deac8523f3b05c267ae20861fc7280

  • Size

    126KB

  • Sample

    221129-v3fmzsdc7y

  • MD5

    7377a636b68ba0d76f8f17313c762320

  • SHA1

    d35161fbc53e59263f0646c70b59b0281c8b93fc

  • SHA256

    8b5fb45cf4006aeb513a7a982b402fa695deac8523f3b05c267ae20861fc7280

  • SHA512

    ca7a74789efda9f1cc6869bf27c284f2522d97dc9c289ff6211c420d351d851ab7a1e092404513f85202c3a185313b355a6d7a5beba191d226e2fe5ff5c6c2aa

  • SSDEEP

    3072:ig/mP4Vi4G/ewSzSS+QVOQQdYmM5eqr6cVpZtu5TmaofJcRm3:idQVFpRzSSFVOQQxMoUppTum

Score
10/10

Malware Config

Targets

    • Target

      8b5fb45cf4006aeb513a7a982b402fa695deac8523f3b05c267ae20861fc7280

    • Size

      126KB

    • MD5

      7377a636b68ba0d76f8f17313c762320

    • SHA1

      d35161fbc53e59263f0646c70b59b0281c8b93fc

    • SHA256

      8b5fb45cf4006aeb513a7a982b402fa695deac8523f3b05c267ae20861fc7280

    • SHA512

      ca7a74789efda9f1cc6869bf27c284f2522d97dc9c289ff6211c420d351d851ab7a1e092404513f85202c3a185313b355a6d7a5beba191d226e2fe5ff5c6c2aa

    • SSDEEP

      3072:ig/mP4Vi4G/ewSzSS+QVOQQdYmM5eqr6cVpZtu5TmaofJcRm3:idQVFpRzSSFVOQQxMoUppTum

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks