General

  • Target

    345680786c000aaaac08b03ca531208f2778804676cc5f49ab4e42b23e74ea8e

  • Size

    123KB

  • Sample

    221202-x2gj1aae6x

  • MD5

    9ae065b62b6ac69fdb3f01c0d945d370

  • SHA1

    ae8eab24167459f620a1b0bb533982012fd8917e

  • SHA256

    345680786c000aaaac08b03ca531208f2778804676cc5f49ab4e42b23e74ea8e

  • SHA512

    37d63c812220e85cfdec20fe985279c4dab6d14e469a6cf8ff8cb6ac7bf2541f020a8e6fa411fe755a27488c18ab2cfc62dd865270ba8b8e8b9603815c6cb0e3

  • SSDEEP

    3072:vNrjIvhH+ZeoMxSFb2NkbTWpD2npjq9rYzHX5R:vNoV+ZeJSttbTaGXHX/

Score
10/10

Malware Config

Targets

    • Target

      345680786c000aaaac08b03ca531208f2778804676cc5f49ab4e42b23e74ea8e

    • Size

      123KB

    • MD5

      9ae065b62b6ac69fdb3f01c0d945d370

    • SHA1

      ae8eab24167459f620a1b0bb533982012fd8917e

    • SHA256

      345680786c000aaaac08b03ca531208f2778804676cc5f49ab4e42b23e74ea8e

    • SHA512

      37d63c812220e85cfdec20fe985279c4dab6d14e469a6cf8ff8cb6ac7bf2541f020a8e6fa411fe755a27488c18ab2cfc62dd865270ba8b8e8b9603815c6cb0e3

    • SSDEEP

      3072:vNrjIvhH+ZeoMxSFb2NkbTWpD2npjq9rYzHX5R:vNoV+ZeJSttbTaGXHX/

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks