General

  • Target

    5cf04b420a9662da4e823867bc143159edcd36c705efc820cb1bc363a77fae4c

  • Size

    116KB

  • Sample

    221201-3dey6aeh3y

  • MD5

    87012d2ab799c59e6beabaab2393f6f0

  • SHA1

    9717e81f1ff99d522aa9867ec75857cabfefeb29

  • SHA256

    5cf04b420a9662da4e823867bc143159edcd36c705efc820cb1bc363a77fae4c

  • SHA512

    42fbd8f7c78b373be78fee774a2d43accfa71e36b9786c977044656701ee34250123a4e859a7afc51e8f76e7413c62a4cb9d0ace9d7f50c621cf8b15e469d47f

  • SSDEEP

    3072:GvUCOhKkulSDZMbMAxH8lyyVxe/6SYl7kvkNzC2Y:5oHDYAxayyT0bTt

Score
10/10

Malware Config

Targets

    • Target

      5cf04b420a9662da4e823867bc143159edcd36c705efc820cb1bc363a77fae4c

    • Size

      116KB

    • MD5

      87012d2ab799c59e6beabaab2393f6f0

    • SHA1

      9717e81f1ff99d522aa9867ec75857cabfefeb29

    • SHA256

      5cf04b420a9662da4e823867bc143159edcd36c705efc820cb1bc363a77fae4c

    • SHA512

      42fbd8f7c78b373be78fee774a2d43accfa71e36b9786c977044656701ee34250123a4e859a7afc51e8f76e7413c62a4cb9d0ace9d7f50c621cf8b15e469d47f

    • SSDEEP

      3072:GvUCOhKkulSDZMbMAxH8lyyVxe/6SYl7kvkNzC2Y:5oHDYAxayyT0bTt

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks