General

  • Target

    c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c

  • Size

    120KB

  • Sample

    221201-lbbqaahd7y

  • MD5

    1d5a4288b5cb14e01183b069b81f61a5

  • SHA1

    538afe10dc642a12ae73688a6c0a0347abaf34ec

  • SHA256

    c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c

  • SHA512

    e1762ae4de3030583ac29a89e8b70d1cd97ca6b9c29bf79f2409f59569b61e162feea40c31329ddf1405432442a8eb1a56a858043e0eb9fd04272bf0cc032513

  • SSDEEP

    3072:1mKFwHpnmBlLW3JB/DOE3csgK/8CXzrCekTU+:sK+JGs3/CwV05U+

Malware Config

Targets

    • Target

      c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c

    • Size

      120KB

    • MD5

      1d5a4288b5cb14e01183b069b81f61a5

    • SHA1

      538afe10dc642a12ae73688a6c0a0347abaf34ec

    • SHA256

      c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c

    • SHA512

      e1762ae4de3030583ac29a89e8b70d1cd97ca6b9c29bf79f2409f59569b61e162feea40c31329ddf1405432442a8eb1a56a858043e0eb9fd04272bf0cc032513

    • SSDEEP

      3072:1mKFwHpnmBlLW3JB/DOE3csgK/8CXzrCekTU+:sK+JGs3/CwV05U+

    • Adds Run key to start application

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks