General

  • Target

    67f13a5e8d691f45002030388529a45657ad742e677bcfc588d3dfbdc1c3c790

  • Size

    508KB

  • Sample

    221201-r4x2wahc79

  • MD5

    c580c63fb6bd0eed9c44c8dea7b4248f

  • SHA1

    89358362bef0bb333e6652a83b81b5aa472c9fa2

  • SHA256

    67f13a5e8d691f45002030388529a45657ad742e677bcfc588d3dfbdc1c3c790

  • SHA512

    c85c1279ba7d3339306ba31218d9424ec34aaee897fe050e7b3fb4290365158456ac22ccd98dc26c44a46b792b746bebd831c17048579a71fdde3877eb0b328d

  • SSDEEP

    6144:J3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:J3xxPuFVtSdWJsuWXLGMvxsltRok/Gy

Score
10/10

Malware Config

Targets

    • Target

      67f13a5e8d691f45002030388529a45657ad742e677bcfc588d3dfbdc1c3c790

    • Size

      508KB

    • MD5

      c580c63fb6bd0eed9c44c8dea7b4248f

    • SHA1

      89358362bef0bb333e6652a83b81b5aa472c9fa2

    • SHA256

      67f13a5e8d691f45002030388529a45657ad742e677bcfc588d3dfbdc1c3c790

    • SHA512

      c85c1279ba7d3339306ba31218d9424ec34aaee897fe050e7b3fb4290365158456ac22ccd98dc26c44a46b792b746bebd831c17048579a71fdde3877eb0b328d

    • SSDEEP

      6144:J3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:J3xxPuFVtSdWJsuWXLGMvxsltRok/Gy

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks