General

  • Target

    d37f97b36b20d57cbb865ff88ff31b603544e294fb12cb0b3d22d52126da397d

  • Size

    118KB

  • Sample

    221201-2hjbpsca4v

  • MD5

    1c88f9d8551a69711027dfd3f772e4b0

  • SHA1

    fc49e025cfdfcf44c4d3d301729d78900ecff17e

  • SHA256

    d37f97b36b20d57cbb865ff88ff31b603544e294fb12cb0b3d22d52126da397d

  • SHA512

    c1e7594f536f4b6a260d66e152757e9749048b7e5c4bd1fa2990bd432f9d55a86ffe4878bf12f115cd2441cb78552c8a440394fc244346009e4f3b29655bc442

  • SSDEEP

    1536:3UXMlsOerrauFFq4vrFksXENeuS0Uv7iTyeFzms//pdoLOJ1DsNQN9tdN9tCNfU5:+9r+oFq4Gs0MN0+7heFzh//oNfU

Score
10/10

Malware Config

Targets

    • Target

      d37f97b36b20d57cbb865ff88ff31b603544e294fb12cb0b3d22d52126da397d

    • Size

      118KB

    • MD5

      1c88f9d8551a69711027dfd3f772e4b0

    • SHA1

      fc49e025cfdfcf44c4d3d301729d78900ecff17e

    • SHA256

      d37f97b36b20d57cbb865ff88ff31b603544e294fb12cb0b3d22d52126da397d

    • SHA512

      c1e7594f536f4b6a260d66e152757e9749048b7e5c4bd1fa2990bd432f9d55a86ffe4878bf12f115cd2441cb78552c8a440394fc244346009e4f3b29655bc442

    • SSDEEP

      1536:3UXMlsOerrauFFq4vrFksXENeuS0Uv7iTyeFzms//pdoLOJ1DsNQN9tdN9tCNfU5:+9r+oFq4Gs0MN0+7heFzh//oNfU

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks