General

  • Target

    8d7b2bc656a49718308965f4802690c1529a4aaa6e8806f5398c73a73cfba01f

  • Size

    104KB

  • Sample

    221201-ph23laba4t

  • MD5

    8e34f26164545905180a50a510bc3fc4

  • SHA1

    5a3c09d0e375fd47e19260c832ce29c3be9b8520

  • SHA256

    8d7b2bc656a49718308965f4802690c1529a4aaa6e8806f5398c73a73cfba01f

  • SHA512

    dd05650984e996e3beffc96e5324aa08c3e15f2f98d153f497fea88330daf0c8356981d3d3e5ffd38cc8e68d2d9572f822574b0a2ccaa371ab34026011f240a4

  • SSDEEP

    3072:uetDOSpgJremwXSAvNdH1w4IqeolDHXOMxiU:2Spgxem/4NbTIq9D3Vxi

Score
8/10

Malware Config

Targets

    • Target

      8d7b2bc656a49718308965f4802690c1529a4aaa6e8806f5398c73a73cfba01f

    • Size

      104KB

    • MD5

      8e34f26164545905180a50a510bc3fc4

    • SHA1

      5a3c09d0e375fd47e19260c832ce29c3be9b8520

    • SHA256

      8d7b2bc656a49718308965f4802690c1529a4aaa6e8806f5398c73a73cfba01f

    • SHA512

      dd05650984e996e3beffc96e5324aa08c3e15f2f98d153f497fea88330daf0c8356981d3d3e5ffd38cc8e68d2d9572f822574b0a2ccaa371ab34026011f240a4

    • SSDEEP

      3072:uetDOSpgJremwXSAvNdH1w4IqeolDHXOMxiU:2Spgxem/4NbTIq9D3Vxi

    Score
    8/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks