General

  • Target

    d86c8ff41e8f92e3a8330966e90a762515ebac22b37c590c090fa407dd9ebdf9

  • Size

    137KB

  • Sample

    221129-vggcdsgd62

  • MD5

    2de418b4fea6fff17ab6fa5ab5edd4d0

  • SHA1

    2f9962477edc2c9aee0aa543945980e889a48633

  • SHA256

    d86c8ff41e8f92e3a8330966e90a762515ebac22b37c590c090fa407dd9ebdf9

  • SHA512

    59c7059fe82c6ecb504490f700d01e15d3aaa7e857e248595c537ddc3026769bda9cb4411591904b70e027ba45214a5e246025bd305f9087e2b54ce9c7b563ab

  • SSDEEP

    1536:KebVlyysVBeJQjc81VxVJT/U2BKhEECfezo+dBcjVJPOH7sVz7riOFvY6oVYbL92:v+P/UkWzo+d27QKQ1VYn9WP7FCed

Score
10/10

Malware Config

Targets

    • Target

      d86c8ff41e8f92e3a8330966e90a762515ebac22b37c590c090fa407dd9ebdf9

    • Size

      137KB

    • MD5

      2de418b4fea6fff17ab6fa5ab5edd4d0

    • SHA1

      2f9962477edc2c9aee0aa543945980e889a48633

    • SHA256

      d86c8ff41e8f92e3a8330966e90a762515ebac22b37c590c090fa407dd9ebdf9

    • SHA512

      59c7059fe82c6ecb504490f700d01e15d3aaa7e857e248595c537ddc3026769bda9cb4411591904b70e027ba45214a5e246025bd305f9087e2b54ce9c7b563ab

    • SSDEEP

      1536:KebVlyysVBeJQjc81VxVJT/U2BKhEECfezo+dBcjVJPOH7sVz7riOFvY6oVYbL92:v+P/UkWzo+d27QKQ1VYn9WP7FCed

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks